Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
b2.exe

Overview

General Information

Sample Name:b2.exe
Analysis ID:626045
MD5:b23f3235c02c47b25ea90d9830aa37c7
SHA1:8dbaf4ec74cc2710582157100afe98ff9158d994
SHA256:46b7d84280339d0b887a8e225d0649e1fcf86302bd553c33716b9c42d3894cc7
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains very large array initializations
Tries to detect virtualization through RDTSC time measurements
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Detected potential crypto function
Found potential string decryption / allocating functions
Contains functionality to launch a process as a different user
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • b2.exe (PID: 4852 cmdline: "C:\Users\user\Desktop\b2.exe" MD5: B23F3235C02C47B25EA90D9830AA37C7)
    • b2.exe (PID: 7148 cmdline: C:\Users\user\Desktop\b2.exe MD5: B23F3235C02C47B25EA90D9830AA37C7)
  • cleanup
{"C2 url": "https://api.telegram.org/bot1324911145:AAEQBcai78GJtNdHHMwAX0xQhP0p7EcyOuo/sendMessage"}
{"Exfil Mode": "Telegram", "Chat id": "1329186530", "Chat URL": "https://api.telegram.org/bot1324911145:AAEQBcai78GJtNdHHMwAX0xQhP0p7EcyOuo/sendDocument"}
SourceRuleDescriptionAuthorStrings
0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      0000000C.00000002.613014718.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000C.00000002.613014718.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          0000000C.00000000.523738264.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 13 entries
            SourceRuleDescriptionAuthorStrings
            12.0.b2.exe.400000.8.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              12.0.b2.exe.400000.8.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                12.0.b2.exe.400000.8.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  12.0.b2.exe.400000.8.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                  • 0x30d39:$s1: get_kbok
                  • 0x3166d:$s2: get_CHoo
                  • 0x322c8:$s3: set_passwordIsSet
                  • 0x30b3d:$s4: get_enableLog
                  • 0x35272:$s8: torbrowser
                  • 0x33c4e:$s10: logins
                  • 0x33527:$s11: credential
                  • 0x2ff23:$g1: get_Clipboard
                  • 0x2ff31:$g2: get_Keyboard
                  • 0x2ff3e:$g3: get_Password
                  • 0x3151b:$g4: get_CtrlKeyDown
                  • 0x3152b:$g5: get_ShiftKeyDown
                  • 0x3153c:$g6: get_AltKeyDown
                  12.0.b2.exe.400000.6.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 19 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 12.0.b2.exe.400000.4.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "1329186530", "Chat URL": "https://api.telegram.org/bot1324911145:AAEQBcai78GJtNdHHMwAX0xQhP0p7EcyOuo/sendDocument"}
                    Source: b2.exe.7148.12.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot1324911145:AAEQBcai78GJtNdHHMwAX0xQhP0p7EcyOuo/sendMessage"}
                    Source: b2.exeVirustotal: Detection: 64%Perma Link
                    Source: b2.exeReversingLabs: Detection: 75%
                    Source: b2.exeAvira: detected
                    Source: b2.exeJoe Sandbox ML: detected
                    Source: 12.0.b2.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 12.0.b2.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 12.0.b2.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 12.0.b2.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 12.0.b2.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 12.2.b2.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: b2.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: b2.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                    Source: Binary string: C:\Dropbox\Dev\ag.v66\Libraries\MSILJitter\bin\RELEASE\win32\AgileDotNetRT.pdb source: f.dll.0.dr

                    Networking

                    barindex
                    Source: Yara matchFile source: 12.0.b2.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.b2.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: f.dll.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                    Source: f.dll.0.drString found in binary or memory: http://ocsp.thawte.com0
                    Source: f.dll.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                    Source: f.dll.0.drString found in binary or memory: http://s2.symcb.com0
                    Source: f.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
                    Source: f.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
                    Source: f.dll.0.drString found in binary or memory: http://sv.symcd.com0&
                    Source: f.dll.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                    Source: f.dll.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                    Source: f.dll.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                    Source: f.dll.0.drString found in binary or memory: http://www.symauth.com/cps0(
                    Source: f.dll.0.drString found in binary or memory: http://www.symauth.com/rpa00
                    Source: b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xqtbof.com
                    Source: b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                    Source: b2.exe, 00000000.00000003.516030971.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.515670250.0000000006376000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.516280598.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.514691789.000000000636D000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.520969631.0000000006A1C000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.516074359.0000000006A14000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.519825219.0000000006A1A000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.515451731.0000000006376000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.518667846.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.519966505.0000000006A1C000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, b2.exe, 0000000C.00000000.522219203.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1324911145:AAEQBcai78GJtNdHHMwAX0xQhP0p7EcyOuo/
                    Source: b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1324911145:AAEQBcai78GJtNdHHMwAX0xQhP0p7EcyOuo/sendDocumentdocument-----
                    Source: f.dll.0.drString found in binary or memory: https://d.symcb.com/cps0%
                    Source: f.dll.0.drString found in binary or memory: https://d.symcb.com/rpa0
                    Source: b2.exe, 00000000.00000003.516030971.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.515670250.0000000006376000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.516280598.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.514691789.000000000636D000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.520969631.0000000006A1C000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.516074359.0000000006A14000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.519825219.0000000006A1A000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.515451731.0000000006376000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.518667846.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.519966505.0000000006A1C000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, b2.exe, 0000000C.00000000.522219203.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                    Source: b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                    Source: b2.exe, 00000000.00000002.533971800.0000000000C09000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                    System Summary

                    barindex
                    Source: 12.0.b2.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 12.0.b2.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 12.0.b2.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 12.0.b2.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 12.2.b2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 12.0.b2.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: b2.exe PID: 7148, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: b2.exe, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 0.0.b2.exe.4c0000.0.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 0.2.b2.exe.4c0000.0.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.e00000.9.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007bFEC5A5F0u002d0C6Eu002d486Fu002d9208u002d7549C4E59E3Cu007d/u00332F6BFD2u002d9E8Bu002d4D29u002d8410u002dA27354B95FB9.csLarge array initialization: .cctor: array initializer size 12014
                    Source: 12.2.b2.exe.e00000.1.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.e00000.5.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.e00000.0.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.e00000.3.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.e00000.13.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.e00000.1.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.400000.12.unpack, u003cPrivateImplementationDetailsu003eu007bFEC5A5F0u002d0C6Eu002d486Fu002d9208u002d7549C4E59E3Cu007d/u00332F6BFD2u002d9E8Bu002d4D29u002d8410u002dA27354B95FB9.csLarge array initialization: .cctor: array initializer size 12014
                    Source: 12.0.b2.exe.400000.6.unpack, u003cPrivateImplementationDetailsu003eu007bFEC5A5F0u002d0C6Eu002d486Fu002d9208u002d7549C4E59E3Cu007d/u00332F6BFD2u002d9E8Bu002d4D29u002d8410u002dA27354B95FB9.csLarge array initialization: .cctor: array initializer size 12014
                    Source: 12.0.b2.exe.e00000.7.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.400000.8.unpack, u003cPrivateImplementationDetailsu003eu007bFEC5A5F0u002d0C6Eu002d486Fu002d9208u002d7549C4E59E3Cu007d/u00332F6BFD2u002d9E8Bu002d4D29u002d8410u002dA27354B95FB9.csLarge array initialization: .cctor: array initializer size 12014
                    Source: b2.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 12.0.b2.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 12.0.b2.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 12.0.b2.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 12.0.b2.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 12.2.b2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 12.0.b2.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: b2.exe PID: 7148, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Users\user\Desktop\b2.exeCode function: 0_2_00BEE3F8
                    Source: C:\Users\user\Desktop\b2.exeCode function: 0_2_00BEE3E9
                    Source: C:\Users\user\Desktop\b2.exeCode function: 0_2_00BE9BB0
                    Source: C:\Users\user\Desktop\b2.exeCode function: 0_2_00BE9BC0
                    Source: C:\Users\user\Desktop\b2.exeCode function: 12_2_01604800
                    Source: C:\Users\user\Desktop\b2.exeCode function: 12_2_01603EB8
                    Source: C:\Users\user\Desktop\b2.exeCode function: 12_2_016081C0
                    Source: C:\Users\user\Desktop\b2.exeCode function: 12_2_01604710
                    Source: C:\Users\user\Desktop\b2.exeCode function: String function: 00BE2970 appears 61 times
                    Source: C:\Users\user\Desktop\b2.exeCode function: 0_2_00BED438 CreateProcessAsUserW,
                    Source: b2.exeBinary or memory string: OriginalFilename vs b2.exe
                    Source: b2.exe, 00000000.00000002.533971800.0000000000C09000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs b2.exe
                    Source: b2.exe, 00000000.00000000.344905302.00000000004D8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename009273620200110_pdf.exe< vs b2.exe
                    Source: b2.exeBinary or memory string: OriginalFilename vs b2.exe
                    Source: b2.exe, 0000000C.00000000.513142471.0000000000E18000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename009273620200110_pdf.exe< vs b2.exe
                    Source: b2.exe, 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHITvAreWBkWWDoLFBJGDIdpxGN.exe4 vs b2.exe
                    Source: b2.exeBinary or memory string: OriginalFilename009273620200110_pdf.exe< vs b2.exe
                    Source: b2.exeVirustotal: Detection: 64%
                    Source: b2.exeReversingLabs: Detection: 75%
                    Source: b2.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\b2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\b2.exe "C:\Users\user\Desktop\b2.exe"
                    Source: C:\Users\user\Desktop\b2.exeProcess created: C:\Users\user\Desktop\b2.exe C:\Users\user\Desktop\b2.exe
                    Source: C:\Users\user\Desktop\b2.exeProcess created: C:\Users\user\Desktop\b2.exe C:\Users\user\Desktop\b2.exe
                    Source: C:\Users\user\Desktop\b2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                    Source: C:\Users\user\Desktop\b2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\b2.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\b2.exe.logJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeFile created: C:\Users\user\AppData\Local\Temp\19f93e2a-4d97-4e0c-ade5-972e41ee6cf8Jump to behavior
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@3/2@0/0
                    Source: C:\Users\user\Desktop\b2.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\Desktop\b2.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: 12.0.b2.exe.400000.4.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 12.0.b2.exe.400000.4.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 12.0.b2.exe.400000.12.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 12.0.b2.exe.400000.12.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 12.0.b2.exe.400000.6.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 12.0.b2.exe.400000.6.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\b2.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                    Source: b2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: b2.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                    Source: Binary string: C:\Dropbox\Dev\ag.v66\Libraries\MSILJitter\bin\RELEASE\win32\AgileDotNetRT.pdb source: f.dll.0.dr
                    Source: f.dll.0.drStatic PE information: section name: .didat
                    Source: f.dll.0.drStatic PE information: section name: .00cfg
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.42416946268
                    Source: C:\Users\user\Desktop\b2.exeFile created: C:\Users\user\AppData\Local\Temp\19f93e2a-4d97-4e0c-ade5-972e41ee6cf8\f.dllJump to dropped file
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\b2.exeRDTSC instruction interceptor: First address: 0000000072B81D36 second address: 0000000072B82A87 instructions: 0x00000000 rdtsc 0x00000002 mov dword ptr [ebp-10h], eax 0x00000005 mov dword ptr [ebp-0Ch], edx 0x00000008 mov eax, dword ptr [ebp-10h] 0x0000000b sub eax, dword ptr [ebp-08h] 0x0000000e mov edx, dword ptr [ebp-0Ch] 0x00000011 sbb edx, dword ptr [ebp-04h] 0x00000014 pop edi 0x00000015 pop esi 0x00000016 pop ebx 0x00000017 mov esp, ebp 0x00000019 pop ebp 0x0000001a ret 0x0000001b mov dword ptr [72B953C0h], eax 0x00000020 mov dword ptr [72B953C4h], edx 0x00000026 mov dword ptr [ebp-0Ch], 00000000h 0x0000002d jmp 00007F76FCDA0DEBh 0x0000002f mov eax, dword ptr [ebp-0Ch] 0x00000032 cmp eax, dword ptr [ebp+08h] 0x00000035 jnl 00007F76FCDA0E26h 0x00000037 rdtsc
                    Source: C:\Users\user\Desktop\b2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\b2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\b2.exe TID: 6848Thread sleep count: 34 > 30
                    Source: C:\Users\user\Desktop\b2.exe TID: 6848Thread sleep time: -31359464925306218s >= -30000s
                    Source: C:\Users\user\Desktop\b2.exe TID: 3268Thread sleep count: 6199 > 30
                    Source: C:\Users\user\Desktop\b2.exe TID: 3268Thread sleep count: 3585 > 30
                    Source: C:\Users\user\Desktop\b2.exe TID: 6440Thread sleep count: 40 > 30
                    Source: C:\Users\user\Desktop\b2.exe TID: 6440Thread sleep time: -36893488147419080s >= -30000s
                    Source: C:\Users\user\Desktop\b2.exe TID: 4696Thread sleep count: 3690 > 30
                    Source: C:\Users\user\Desktop\b2.exe TID: 4696Thread sleep count: 6133 > 30
                    Source: C:\Users\user\Desktop\b2.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\b2.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\b2.exeWindow / User API: threadDelayed 6199
                    Source: C:\Users\user\Desktop\b2.exeWindow / User API: threadDelayed 3585
                    Source: C:\Users\user\Desktop\b2.exeWindow / User API: threadDelayed 3690
                    Source: C:\Users\user\Desktop\b2.exeWindow / User API: threadDelayed 6133
                    Source: C:\Users\user\Desktop\b2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\b2.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\b2.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\b2.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\b2.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\b2.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\b2.exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\b2.exeMemory written: C:\Users\user\Desktop\b2.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\b2.exeProcess created: C:\Users\user\Desktop\b2.exe C:\Users\user\Desktop\b2.exe
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Users\user\Desktop\b2.exe VolumeInformation
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Utilities.v4.0\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Utilities.v4.0.dll VolumeInformation
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Users\user\Desktop\b2.exe VolumeInformation
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\Desktop\b2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: b2.exe PID: 7148, type: MEMORYSTR
                    Source: Yara matchFile source: 12.0.b2.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.b2.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.613014718.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000000.523738264.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000000.523078417.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000000.522219203.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: b2.exe PID: 7148, type: MEMORYSTR
                    Source: Yara matchFile source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: b2.exe PID: 7148, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: b2.exe PID: 7148, type: MEMORYSTR
                    Source: Yara matchFile source: 12.0.b2.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.b2.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.613014718.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000000.523738264.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000000.523078417.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000000.522219203.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: b2.exe PID: 7148, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    1
                    Valid Accounts
                    211
                    Windows Management Instrumentation
                    1
                    Valid Accounts
                    1
                    Valid Accounts
                    1
                    Masquerading
                    1
                    Input Capture
                    21
                    Security Software Discovery
                    Remote Services1
                    Input Capture
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    Access Token Manipulation
                    1
                    Valid Accounts
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol11
                    Archive Collected Data
                    Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)111
                    Process Injection
                    1
                    Access Token Manipulation
                    Security Account Manager131
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                    Disable or Modify Tools
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script131
                    Virtualization/Sandbox Evasion
                    LSA Secrets213
                    System Information Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common111
                    Process Injection
                    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items11
                    Deobfuscate/Decode Files or Information
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job2
                    Obfuscated Files or Information
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)2
                    Software Packing
                    /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    b2.exe64%VirustotalBrowse
                    b2.exe75%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    b2.exe100%AviraHEUR/AGEN.1234902
                    b2.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\19f93e2a-4d97-4e0c-ade5-972e41ee6cf8\f.dll0%VirustotalBrowse
                    C:\Users\user\AppData\Local\Temp\19f93e2a-4d97-4e0c-ade5-972e41ee6cf8\f.dll0%MetadefenderBrowse
                    C:\Users\user\AppData\Local\Temp\19f93e2a-4d97-4e0c-ade5-972e41ee6cf8\f.dll2%ReversingLabs
                    SourceDetectionScannerLabelLinkDownload
                    12.0.b2.exe.e00000.9.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    12.2.b2.exe.e00000.1.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.e00000.5.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.e00000.0.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.e00000.3.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.e00000.13.unpack100%AviraHEUR/AGEN.1234902Download File
                    0.0.b2.exe.4c0000.0.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.e00000.1.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    12.0.b2.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    12.0.b2.exe.e00000.7.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    12.0.b2.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    12.0.b2.exe.e00000.11.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.2.b2.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    0.2.b2.exe.4c0000.0.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.e00000.2.unpack100%AviraHEUR/AGEN.1234902Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://xqtbof.com0%Avira URL Cloudsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    http://ocsp.thawte.com00%URL Reputationsafe
                    https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://xqtbof.comb2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://127.0.0.1:HTTP/1.1b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://DynDns.comDynDNSb2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.telegram.org/bot1324911145:AAEQBcai78GJtNdHHMwAX0xQhP0p7EcyOuo/sendDocumentdocument-----b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://api.telegram.org/bot1324911145:AAEQBcai78GJtNdHHMwAX0xQhP0p7EcyOuo/b2.exe, 00000000.00000003.516030971.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.515670250.0000000006376000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.516280598.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.514691789.000000000636D000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.520969631.0000000006A1C000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.516074359.0000000006A14000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.519825219.0000000006A1A000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.515451731.0000000006376000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.518667846.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.519966505.0000000006A1C000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, b2.exe, 0000000C.00000000.522219203.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                        high
                        http://crl.thawte.com/ThawteTimestampingCA.crl0f.dll.0.drfalse
                          high
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%hab2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.symauth.com/cps0(f.dll.0.drfalse
                            high
                            http://www.symauth.com/rpa00f.dll.0.drfalse
                              high
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipb2.exe, 00000000.00000003.516030971.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.515670250.0000000006376000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.516280598.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.514691789.000000000636D000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.520969631.0000000006A1C000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.516074359.0000000006A14000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.519825219.0000000006A1A000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.515451731.0000000006376000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.518667846.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.519966505.0000000006A1C000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, b2.exe, 0000000C.00000000.522219203.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://ocsp.thawte.com0f.dll.0.drfalse
                              • URL Reputation: safe
                              unknown
                              https://api.ipify.orgGETMozilla/5.0b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              No contacted IP infos
                              Joe Sandbox Version:34.0.0 Boulder Opal
                              Analysis ID:626045
                              Start date and time: 13/05/202214:32:122022-05-13 14:32:12 +02:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 9m 53s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:b2.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:20
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@3/2@0/0
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:
                              • Successful, ratio: 0.5% (good quality ratio 0.2%)
                              • Quality average: 13.9%
                              • Quality standard deviation: 12.9%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Adjust boot time
                              • Enable AMSI
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                              • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fp-afd.azureedge.us, client.wns.windows.com, store-images.s-microsoft.com, login.live.com, fp-vp.azureedge.net, sls.update.microsoft.com, settings-win.data.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, b-ring.msedge.net, arc.msn.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              TimeTypeDescription
                              14:33:26API Interceptor434x Sleep call for process: b2.exe modified
                              No context
                              No context
                              No context
                              No context
                              No context
                              Process:C:\Users\user\Desktop\b2.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1976
                              Entropy (8bit):5.3569395659576475
                              Encrypted:false
                              SSDEEP:48:MxHKXeHKlEHU0YHKhQnouHIW7HKjntHoxHhAHKzvGHKogHG1qHj:iqXeqm00YqhQnouRqjntIxHeqz+qogmm
                              MD5:D1F580650522B7EBD7F438FD6B22F339
                              SHA1:768BA6465A6C6107AC504EC2E254F090021EB643
                              SHA-256:8280C0A16B5638C762196E6C892BF0940FF9C94435407C66992DA9D592999910
                              SHA-512:BE90D7CD9009EF4BB5DE65E64CE522CBEFE3070386D937CCEACFB85E949CA39F954DD5808593D1A4FB806E990E61D465E83B87B80CD2540CF1CE80A0B184700C
                              Malicious:true
                              Reputation:moderate, very likely benign file
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                              Process:C:\Users\user\Desktop\b2.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):96664
                              Entropy (8bit):5.567444078679915
                              Encrypted:false
                              SSDEEP:1536:JKQ7ZLTFq31bfnHSukoY1IPtan1sBrGxEm5g:JKc/FM1bfnyNNdkrGxJg
                              MD5:14FF402962AD21B78AE0B4C43CD1F194
                              SHA1:F8A510EB26666E875A5BDD1CADAD40602763AD72
                              SHA-256:FB9646CB956945BDC503E69645F6B5316D3826B780D3C36738D6B944E884D15B
                              SHA-512:DAA7A08BF3709119A944BCE28F6EBDD24E54A22B18CD9F86A87873E958DF121A3881DCDD5E162F6B4E543238C7AEF20F657C9830DF01D4C79290F7C9A4FCC54B
                              Malicious:false
                              Antivirus:
                              • Antivirus: Virustotal, Detection: 0%, Browse
                              • Antivirus: Metadefender, Detection: 0%, Browse
                              • Antivirus: ReversingLabs, Detection: 2%
                              Reputation:moderate, very likely benign file
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........jr..jr..jr..8...ir......kr......cr..jr..9r..8...kr......sr......kr....x.kr..jr..kr......kr..Richjr..................PE..L...5 .\...........!.........F...............0......................................Z.....@..........................C......0b..d....................b..........4...`A..8...........................x7..@............`..0....p..`....................text...h........................... ..`.rdata.......0......."..............@..@.data........P.......:..............@....idata.......`.......<..............@..@.didat..a....p.......J..............@....00cfg...............N..............@..@.rsrc................P..............@..@.reloc...............X..............@..B........................................................................................................................................................................................
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):7.404995176366941
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                              • Win32 Executable (generic) a (10002005/4) 49.97%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              • DOS Executable Generic (2002/1) 0.01%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:b2.exe
                              File size:410624
                              MD5:b23f3235c02c47b25ea90d9830aa37c7
                              SHA1:8dbaf4ec74cc2710582157100afe98ff9158d994
                              SHA256:46b7d84280339d0b887a8e225d0649e1fcf86302bd553c33716b9c42d3894cc7
                              SHA512:c60f1880fd35d086055c285f4c9002c0a75088a2cff0927985b8c2ae59f708bf93f100c17bf9c2baeeb7d265ca2e23c7fda1bd6981495ae82cbc0ad080667558
                              SSDEEP:12288:k9D4fqRBdy4r3XyMb6U0t3TtUcIlXlWC:+fdNXPmPCJlXl
                              TLSH:D2945A70F883445DC97B87F2616744F0F5B915C6FB400E0D61EA73388E1BA6BA39E16A
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...X`.^.................8...........W... ...`....@.. ....................................`................................
                              Icon Hash:00828e8e8686b000
                              Entrypoint:0x4657ce
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                              Time Stamp:0x5EAB6058 [Thu Apr 30 23:33:44 2020 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:v4.0.30319
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x657780x53.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x660000x622.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x680000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x637d40x63800False0.669809005967data7.42416946268IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rsrc0x660000x6220x800False0.36181640625data3.65899044286IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x680000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_VERSION0x660a00x398data
                              RT_MANIFEST0x664380x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              DLLImport
                              mscoree.dll_CorExeMain
                              DescriptionData
                              Translation0x0000 0x04b0
                              LegalCopyrightCopyright 2014 - 2020
                              Assembly Version0.0.0.0
                              InternalName009273620200110_pdf.exe
                              FileVersion9.13.18.22
                              CompanyNameu{5/3x9e*:6vi$01m?a_
                              Comments3h:=2s8g%;0mv[69j!i/7&
                              ProductName2e=y)4+3u7z~*
                              ProductVersion9.13.18.22
                              FileDescription2e=y)4+3u7z~*
                              OriginalFilename009273620200110_pdf.exe
                              No network behavior found

                              Click to jump to process

                              Target ID:0
                              Start time:14:33:23
                              Start date:13/05/2022
                              Path:C:\Users\user\Desktop\b2.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\b2.exe"
                              Imagebase:0x4c0000
                              File size:410624 bytes
                              MD5 hash:B23F3235C02C47B25EA90D9830AA37C7
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Reputation:low

                              Target ID:12
                              Start time:14:34:41
                              Start date:13/05/2022
                              Path:C:\Users\user\Desktop\b2.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\b2.exe
                              Imagebase:0xe00000
                              File size:410624 bytes
                              MD5 hash:B23F3235C02C47B25EA90D9830AA37C7
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.613014718.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000C.00000002.613014718.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000000.523738264.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000C.00000000.523738264.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000000.523078417.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000C.00000000.523078417.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000000.522219203.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000C.00000000.522219203.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                              Reputation:low

                              No disassembly