Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
63.exe

Overview

General Information

Sample Name:63.exe
Analysis ID:626030
MD5:638161fea451ac9d2cff99a9b9a7446c
SHA1:0ebd57241094f53ce80470edd61bfc0c8361eb2a
SHA256:f144a51298e1e037133ad60094a271af9d65501a3ab5e41527efb6bcb56ccf58
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Antivirus / Scanner detection for submitted sample
Writes to foreign memory regions
Machine Learning detection for sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains very large array initializations
Tries to detect virtualization through RDTSC time measurements
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • 63.exe (PID: 6408 cmdline: "C:\Users\user\Desktop\63.exe" MD5: 638161FEA451AC9D2CFF99A9B9A7446C)
    • RegAsm.exe (PID: 5680 cmdline: C:\Users\user\AppData\Local\Temp\RegAsm.exe MD5: 6FD7592411112729BF6B1F2F6C34899F)
  • cleanup
{"C2 url": "https://api.telegram.org/bot1160330796:AAF3SAwgW-OTi9M5kDhSZUlENwhKRvFOWe8/sendMessage"}
{"Exfil Mode": "Telegram", "Chat id": "1354205151", "Chat URL": "https://api.telegram.org/bot1160330796:AAF3SAwgW-OTi9M5kDhSZUlENwhKRvFOWe8/sendDocument"}
SourceRuleDescriptionAuthorStrings
00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000010.00000000.424683140.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000010.00000000.424683140.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 13 entries
            SourceRuleDescriptionAuthorStrings
            16.0.RegAsm.exe.400000.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              16.0.RegAsm.exe.400000.4.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                16.0.RegAsm.exe.400000.4.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  16.0.RegAsm.exe.400000.4.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                  • 0x30013:$s1: get_kbok
                  • 0x3092d:$s2: get_CHoo
                  • 0x31538:$s3: set_passwordIsSet
                  • 0x2fe29:$s4: get_enableLog
                  • 0x3445e:$s8: torbrowser
                  • 0x32e1d:$s10: logins
                  • 0x326f6:$s11: credential
                  • 0x2f254:$g1: get_Clipboard
                  • 0x2f262:$g2: get_Keyboard
                  • 0x2f26f:$g3: get_Password
                  • 0x307dd:$g4: get_CtrlKeyDown
                  • 0x307ed:$g5: get_ShiftKeyDown
                  • 0x307fe:$g6: get_AltKeyDown
                  16.0.RegAsm.exe.400000.10.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 19 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 16.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "1354205151", "Chat URL": "https://api.telegram.org/bot1160330796:AAF3SAwgW-OTi9M5kDhSZUlENwhKRvFOWe8/sendDocument"}
                    Source: RegAsm.exe.5680.16.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot1160330796:AAF3SAwgW-OTi9M5kDhSZUlENwhKRvFOWe8/sendMessage"}
                    Source: 63.exeVirustotal: Detection: 67%Perma Link
                    Source: 63.exeReversingLabs: Detection: 65%
                    Source: 63.exeAvira: detected
                    Source: 63.exeJoe Sandbox ML: detected
                    Source: 16.2.RegAsm.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 16.0.RegAsm.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 16.0.RegAsm.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 16.0.RegAsm.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 16.0.RegAsm.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 16.0.RegAsm.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 63.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 63.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                    Source: Binary string: clrjit.pdb source: 63.exe, 00000000.00000003.268630387.00000000052AD000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: RegAsm.pdb source: RegAsm.exe, RegAsm.exe, 00000010.00000000.424779246.0000000000952000.00000002.00000001.01000000.0000000A.sdmp, RegAsm.exe.0.dr
                    Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000010.00000000.424779246.0000000000952000.00000002.00000001.01000000.0000000A.sdmp, RegAsm.exe.0.dr
                    Source: Binary string: C:\Dropbox\Dev\ag.v66\Libraries\MSILJitter\bin\RELEASE\win32\AgileDotNetRT.pdb source: o.dll.0.dr

                    Networking

                    barindex
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ZPEHvd.com
                    Source: o.dll.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                    Source: o.dll.0.drString found in binary or memory: http://ocsp.thawte.com0
                    Source: o.dll.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                    Source: o.dll.0.drString found in binary or memory: http://s2.symcb.com0
                    Source: o.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
                    Source: o.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
                    Source: o.dll.0.drString found in binary or memory: http://sv.symcd.com0&
                    Source: o.dll.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                    Source: o.dll.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                    Source: o.dll.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                    Source: o.dll.0.drString found in binary or memory: http://www.symauth.com/cps0(
                    Source: o.dll.0.drString found in binary or memory: http://www.symauth.com/rpa00
                    Source: RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                    Source: RegAsm.exe, 00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1160330796:AAF3SAwgW-OTi9M5kDhSZUlENwhKRvFOWe8/
                    Source: RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1160330796:AAF3SAwgW-OTi9M5kDhSZUlENwhKRvFOWe8/sendDocumentdocument-----
                    Source: o.dll.0.drString found in binary or memory: https://d.symcb.com/cps0%
                    Source: o.dll.0.drString found in binary or memory: https://d.symcb.com/rpa0
                    Source: RegAsm.exe, 00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                    Source: RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                    System Summary

                    barindex
                    Source: 16.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.0.RegAsm.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.0.RegAsm.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.0.RegAsm.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.0.RegAsm.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: RegAsm.exe PID: 5680, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 63.exe, owjkr/vpvao.csLarge array initialization: .cctor: array initializer size 132624
                    Source: 0.0.63.exe.7c0000.0.unpack, owjkr/vpvao.csLarge array initialization: .cctor: array initializer size 132624
                    Source: 16.2.RegAsm.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bD9E03315u002dB701u002d40B2u002dA9AAu002d216CD680177Fu007d/u003874ABDA0u002dAC0Cu002d4641u002dA022u002d803F71CBA88B.csLarge array initialization: .cctor: array initializer size 11839
                    Source: 16.0.RegAsm.exe.400000.10.unpack, u003cPrivateImplementationDetailsu003eu007bD9E03315u002dB701u002d40B2u002dA9AAu002d216CD680177Fu007d/u003874ABDA0u002dAC0Cu002d4641u002dA022u002d803F71CBA88B.csLarge array initialization: .cctor: array initializer size 11839
                    Source: 16.0.RegAsm.exe.400000.6.unpack, u003cPrivateImplementationDetailsu003eu007bD9E03315u002dB701u002d40B2u002dA9AAu002d216CD680177Fu007d/u003874ABDA0u002dAC0Cu002d4641u002dA022u002d803F71CBA88B.csLarge array initialization: .cctor: array initializer size 11839
                    Source: 16.0.RegAsm.exe.400000.12.unpack, u003cPrivateImplementationDetailsu003eu007bD9E03315u002dB701u002d40B2u002dA9AAu002d216CD680177Fu007d/u003874ABDA0u002dAC0Cu002d4641u002dA022u002d803F71CBA88B.csLarge array initialization: .cctor: array initializer size 11839
                    Source: 16.0.RegAsm.exe.400000.8.unpack, u003cPrivateImplementationDetailsu003eu007bD9E03315u002dB701u002d40B2u002dA9AAu002d216CD680177Fu007d/u003874ABDA0u002dAC0Cu002d4641u002dA022u002d803F71CBA88B.csLarge array initialization: .cctor: array initializer size 11839
                    Source: 63.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 16.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.0.RegAsm.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.0.RegAsm.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.0.RegAsm.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.0.RegAsm.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: RegAsm.exe PID: 5680, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_00953DFE
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_010B46E0
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_010B4610
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_010B46B0
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_010BD1A0
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE6508
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE8CD8
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE7120
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE6850
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE2204
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE2194
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE2258
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE2224
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE2234
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE2202
                    Source: 63.exe, 00000000.00000000.261457145.0000000000832000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDOCUMENT.exe4 vs 63.exe
                    Source: 63.exe, 00000000.00000003.268630387.00000000052AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclrjit.dllT vs 63.exe
                    Source: 63.exeBinary or memory string: OriginalFilenameDOCUMENT.exe4 vs 63.exe
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeSection loaded: sfc.dll
                    Source: 63.exeVirustotal: Detection: 67%
                    Source: 63.exeReversingLabs: Detection: 65%
                    Source: C:\Users\user\Desktop\63.exeFile read: C:\Users\user\Desktop\63.exe:Zone.IdentifierJump to behavior
                    Source: 63.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\63.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\63.exe "C:\Users\user\Desktop\63.exe"
                    Source: C:\Users\user\Desktop\63.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exe
                    Source: C:\Users\user\Desktop\63.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exe
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\63.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\63.exe.logJump to behavior
                    Source: C:\Users\user\Desktop\63.exeFile created: C:\Users\user\AppData\Local\Temp\851a6346-8539-40b9-b694-d1d5343c092eJump to behavior
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@3/3@0/0
                    Source: C:\Users\user\Desktop\63.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: 63.exe, uhvtn/ruypt.csCryptographic APIs: 'TransformBlock'
                    Source: 63.exe, muhbh/lnibr.csCryptographic APIs: 'TransformBlock'
                    Source: 63.exe, qgfei/supzt.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.0.63.exe.7c0000.0.unpack, muhbh/lnibr.csCryptographic APIs: 'TransformBlock'
                    Source: 0.0.63.exe.7c0000.0.unpack, qgfei/supzt.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.0.63.exe.7c0000.0.unpack, uhvtn/ruypt.csCryptographic APIs: 'TransformBlock'
                    Source: 16.2.RegAsm.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 16.2.RegAsm.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 16.0.RegAsm.exe.400000.10.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 16.0.RegAsm.exe.400000.10.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\63.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                    Source: 63.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: 63.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                    Source: Binary string: clrjit.pdb source: 63.exe, 00000000.00000003.268630387.00000000052AD000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: RegAsm.pdb source: RegAsm.exe, RegAsm.exe, 00000010.00000000.424779246.0000000000952000.00000002.00000001.01000000.0000000A.sdmp, RegAsm.exe.0.dr
                    Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000010.00000000.424779246.0000000000952000.00000002.00000001.01000000.0000000A.sdmp, RegAsm.exe.0.dr
                    Source: Binary string: C:\Dropbox\Dev\ag.v66\Libraries\MSILJitter\bin\RELEASE\win32\AgileDotNetRT.pdb source: o.dll.0.dr
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_00954289 push es; retf
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_009544A3 push es; retf
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_00954469 push cs; retf
                    Source: o.dll.0.drStatic PE information: section name: .didat
                    Source: o.dll.0.drStatic PE information: section name: .00cfg
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.51647686445
                    Source: C:\Users\user\Desktop\63.exeFile created: C:\Users\user\AppData\Local\Temp\851a6346-8539-40b9-b694-d1d5343c092e\o.dllJump to dropped file
                    Source: C:\Users\user\Desktop\63.exeFile created: C:\Users\user\AppData\Local\Temp\RegAsm.exeJump to dropped file
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\63.exeRDTSC instruction interceptor: First address: 0000000072BF1D36 second address: 0000000072BF2A87 instructions: 0x00000000 rdtsc 0x00000002 mov dword ptr [ebp-10h], eax 0x00000005 mov dword ptr [ebp-0Ch], edx 0x00000008 mov eax, dword ptr [ebp-10h] 0x0000000b sub eax, dword ptr [ebp-08h] 0x0000000e mov edx, dword ptr [ebp-0Ch] 0x00000011 sbb edx, dword ptr [ebp-04h] 0x00000014 pop edi 0x00000015 pop esi 0x00000016 pop ebx 0x00000017 mov esp, ebp 0x00000019 pop ebp 0x0000001a ret 0x0000001b mov dword ptr [72C053C0h], eax 0x00000020 mov dword ptr [72C053C4h], edx 0x00000026 mov dword ptr [ebp-0Ch], 00000000h 0x0000002d jmp 00007FDD04A4D2FBh 0x0000002f mov eax, dword ptr [ebp-0Ch] 0x00000032 cmp eax, dword ptr [ebp+08h] 0x00000035 jnl 00007FDD04A4D336h 0x00000037 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\63.exe TID: 6460Thread sleep count: 238 > 30
                    Source: C:\Users\user\Desktop\63.exe TID: 1128Thread sleep count: 39 > 30
                    Source: C:\Users\user\Desktop\63.exe TID: 1128Thread sleep time: -35971150943733603s >= -30000s
                    Source: C:\Users\user\Desktop\63.exe TID: 6196Thread sleep count: 4509 > 30
                    Source: C:\Users\user\Desktop\63.exe TID: 6196Thread sleep count: 4881 > 30
                    Source: C:\Users\user\Desktop\63.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\63.exeWindow / User API: threadDelayed 4509
                    Source: C:\Users\user\Desktop\63.exeWindow / User API: threadDelayed 4881
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\63.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\63.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\63.exeProcess token adjusted: Debug
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\63.exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\63.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 400000
                    Source: C:\Users\user\Desktop\63.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 402000
                    Source: C:\Users\user\Desktop\63.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 438000
                    Source: C:\Users\user\Desktop\63.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 43A000
                    Source: C:\Users\user\Desktop\63.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: B81008
                    Source: C:\Users\user\Desktop\63.exeMemory allocated: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 400000 protect: page execute and read and write
                    Source: C:\Users\user\Desktop\63.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\63.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exe
                    Source: C:\Users\user\Desktop\63.exeQueries volume information: C:\Users\user\Desktop\63.exe VolumeInformation
                    Source: C:\Users\user\Desktop\63.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\63.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Users\user\AppData\Local\Temp\RegAsm.exe VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\Desktop\63.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5680, type: MEMORYSTR
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.424683140.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.424295986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.529314857.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.423853193.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5680, type: MEMORYSTR
                    Source: Yara matchFile source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5680, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5680, type: MEMORYSTR
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.424683140.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.424295986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.529314857.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.423853193.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5680, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    311
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping21
                    Security Software Discovery
                    Remote Services11
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
                    Virtualization/Sandbox Evasion
                    Security Account Manager131
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)311
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets213
                    System Information Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common2
                    Obfuscated Files or Information
                    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items2
                    Software Packing
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    63.exe68%VirustotalBrowse
                    63.exe65%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    63.exe100%AviraHEUR/AGEN.1202787
                    63.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\851a6346-8539-40b9-b694-d1d5343c092e\o.dll0%MetadefenderBrowse
                    C:\Users\user\AppData\Local\Temp\851a6346-8539-40b9-b694-d1d5343c092e\o.dll2%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\RegAsm.exe0%MetadefenderBrowse
                    C:\Users\user\AppData\Local\Temp\RegAsm.exe0%ReversingLabs
                    SourceDetectionScannerLabelLinkDownload
                    16.2.RegAsm.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    16.0.RegAsm.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    16.0.RegAsm.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    0.0.63.exe.7c0000.0.unpack100%AviraHEUR/AGEN.1202787Download File
                    16.0.RegAsm.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    16.0.RegAsm.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    16.0.RegAsm.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    http://ocsp.thawte.com00%URL Reputationsafe
                    http://ZPEHvd.com0%Avira URL Cloudsafe
                    https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://127.0.0.1:HTTP/1.1RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://DynDns.comDynDNSRegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.telegram.org/bot1160330796:AAF3SAwgW-OTi9M5kDhSZUlENwhKRvFOWe8/sendDocumentdocument-----RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://crl.thawte.com/ThawteTimestampingCA.crl0o.dll.0.drfalse
                        high
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.symauth.com/cps0(o.dll.0.drfalse
                          high
                          http://www.symauth.com/rpa00o.dll.0.drfalse
                            high
                            https://api.telegram.org/bot1160330796:AAF3SAwgW-OTi9M5kDhSZUlENwhKRvFOWe8/RegAsm.exe, 00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              high
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipRegAsm.exe, 00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://ocsp.thawte.com0o.dll.0.drfalse
                              • URL Reputation: safe
                              unknown
                              http://ZPEHvd.comRegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.ipify.orgGETMozilla/5.0RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              No contacted IP infos
                              Joe Sandbox Version:34.0.0 Boulder Opal
                              Analysis ID:626030
                              Start date and time: 13/05/202214:03:352022-05-13 14:03:35 +02:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 8m 5s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:63.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:24
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@3/3@0/0
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:
                              • Successful, ratio: 0.2% (good quality ratio 0.2%)
                              • Quality average: 64.9%
                              • Quality standard deviation: 24%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Adjust boot time
                              • Enable AMSI
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
                              • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              TimeTypeDescription
                              14:05:44API Interceptor87x Sleep call for process: 63.exe modified
                              No context
                              No context
                              No context
                              No context
                              No context
                              Process:C:\Users\user\Desktop\63.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1871
                              Entropy (8bit):5.35489297593518
                              Encrypted:false
                              SSDEEP:48:MxHKXeHKlEHU0YHKhQnouHIW7HKjntHoxHhAHKzvGHKx1qHj:iqXeqm00YqhQnouRqjntIxHeqz+qxwD
                              MD5:D5C4F072A3F0ED8C0079814E68AF222D
                              SHA1:D2ACD6634158C5B881919FCE628716B7C3E519EB
                              SHA-256:DAAD0CC8592CA67F6ACCFCB2127FC9D08F514D4165F8617E0150FE1784808FC5
                              SHA-512:635C0F7EEF16AD97257E63D6489284CF529A01CAB450A6ABEFD72FBCC78F209770EA3452B8703F637DA15938251CAD5D89A8FA8CB35903F2974A96D893456FA3
                              Malicious:true
                              Reputation:moderate, very likely benign file
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                              Process:C:\Users\user\Desktop\63.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):96664
                              Entropy (8bit):5.567444078679915
                              Encrypted:false
                              SSDEEP:1536:JKQ7ZLTFq31bfnHSukoY1IPtan1sBrGxEm5g:JKc/FM1bfnyNNdkrGxJg
                              MD5:14FF402962AD21B78AE0B4C43CD1F194
                              SHA1:F8A510EB26666E875A5BDD1CADAD40602763AD72
                              SHA-256:FB9646CB956945BDC503E69645F6B5316D3826B780D3C36738D6B944E884D15B
                              SHA-512:DAA7A08BF3709119A944BCE28F6EBDD24E54A22B18CD9F86A87873E958DF121A3881DCDD5E162F6B4E543238C7AEF20F657C9830DF01D4C79290F7C9A4FCC54B
                              Malicious:false
                              Antivirus:
                              • Antivirus: Metadefender, Detection: 0%, Browse
                              • Antivirus: ReversingLabs, Detection: 2%
                              Reputation:moderate, very likely benign file
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........jr..jr..jr..8...ir......kr......cr..jr..9r..8...kr......sr......kr....x.kr..jr..kr......kr..Richjr..................PE..L...5 .\...........!.........F...............0......................................Z.....@..........................C......0b..d....................b..........4...`A..8...........................x7..@............`..0....p..`....................text...h........................... ..`.rdata.......0......."..............@..@.data........P.......:..............@....idata.......`.......<..............@..@.didat..a....p.......J..............@....00cfg...............N..............@..@.rsrc................P..............@..@.reloc...............X..............@..B........................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\63.exe
                              File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):64616
                              Entropy (8bit):6.037264560032456
                              Encrypted:false
                              SSDEEP:768:J8XcJiMjm2ieHlPyCsSuJbn8dBhFVBSMQ6Iq8TSYDKpgLaDViRLNdr:9YMaNylPYSAb8dBnTHv8DKKaDVkX
                              MD5:6FD7592411112729BF6B1F2F6C34899F
                              SHA1:5E5C839726D6A43C478AB0B95DBF52136679F5EA
                              SHA-256:FFE4480CCC81B061F725C54587E9D1BA96547D27FE28083305D75796F2EB3E74
                              SHA-512:21EFCC9DEE3960F1A64C6D8A44871742558666BB792D77ACE91236C7DBF42A6CA77086918F363C4391D9C00904C55A952E2C18BE5FA1A67A509827BFC630070D
                              Malicious:true
                              Antivirus:
                              • Antivirus: Metadefender, Detection: 0%, Browse
                              • Antivirus: ReversingLabs, Detection: 0%
                              Reputation:moderate, very likely benign file
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...xX.Z..............0.............^.... ........@.. ....................... ............`.....................................O.......8...............h>........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.501105460847332
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                              • Win32 Executable (generic) a (10002005/4) 49.97%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              • DOS Executable Generic (2002/1) 0.01%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:63.exe
                              File size:454656
                              MD5:638161fea451ac9d2cff99a9b9a7446c
                              SHA1:0ebd57241094f53ce80470edd61bfc0c8361eb2a
                              SHA256:f144a51298e1e037133ad60094a271af9d65501a3ab5e41527efb6bcb56ccf58
                              SHA512:2fb6f70458b40cc4d6566714873623e2ad6769fe6d5ebbf9c7fa514c9359870ea62acbd718edb96ac10c214f6b2e6f53bde59ff4b29d08866be059b7b36c3d3f
                              SSDEEP:6144:DKf9ojc7FRWwDFSs5Og4HzABTOZozWIvRgDpIMRMjPjKNThg:2bRWwpSsMBHkBTkSWMjWg
                              TLSH:8CA45CB73D52687DCA6E0675046A84C1FAB617CB3F908B0DB19F830C0E15A6BEB63517
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F._................................. ... ....@.. .......................`............`................................
                              Icon Hash:00828e8e8686b000
                              Entrypoint:0x47050e
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                              Time Stamp:0x5FAA4607 [Tue Nov 10 07:49:27 2020 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x704c00x4b.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x720000x4d6.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x740000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x6e5140x6e600False0.685783550396SysEx File - Moog7.51647686445IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rsrc0x720000x4d60x600False0.380859375data3.78443747428IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x740000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_VERSION0x720a00x24cdata
                              RT_MANIFEST0x722ec0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              DLLImport
                              mscoree.dll_CorExeMain
                              DescriptionData
                              Translation0x0000 0x04b0
                              LegalCopyright
                              Assembly Version0.0.0.0
                              InternalNameDOCUMENT.exe
                              FileVersion0.0.0.0
                              ProductVersion0.0.0.0
                              FileDescription
                              OriginalFilenameDOCUMENT.exe
                              No network behavior found

                              Click to jump to process

                              Target ID:0
                              Start time:14:04:44
                              Start date:13/05/2022
                              Path:C:\Users\user\Desktop\63.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\63.exe"
                              Imagebase:0x7c0000
                              File size:454656 bytes
                              MD5 hash:638161FEA451AC9D2CFF99A9B9A7446C
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Reputation:low

                              Target ID:16
                              Start time:14:05:59
                              Start date:13/05/2022
                              Path:C:\Users\user\AppData\Local\Temp\RegAsm.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\AppData\Local\Temp\RegAsm.exe
                              Imagebase:0x950000
                              File size:64616 bytes
                              MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000000.424683140.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000000.424683140.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000000.424295986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000000.424295986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.529314857.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000002.529314857.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000000.423853193.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000000.423853193.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              Antivirus matches:
                              • Detection: 0%, Metadefender, Browse
                              • Detection: 0%, ReversingLabs
                              Reputation:high

                              No disassembly