Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe

Overview

General Information

Sample Name:VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
Analysis ID:635135
MD5:9c4dccd93ae4440b5dbc580a85f53b94
SHA1:c9caa8238fc581ce3504a8513a2e3ee4701e9274
SHA256:78990521b8fd82b6f0eae446fc6d3f4763764bd85f8820dc7d0a3eeb50d8933b
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Multi AV Scanner detection for dropped file
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Contains functionality to register a low level keyboard hook
Machine Learning detection for sample
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Creates autostart registry keys with suspicious names
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to launch a process as a different user
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Creates processes with suspicious names
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • 231.exe (PID: 6296 cmdline: "C:\Users\user\AppData\Roaming\231\231.exe" MD5: 9C4DCCD93AE4440B5DBC580A85F53B94)
  • 231.exe (PID: 6744 cmdline: "C:\Users\user\AppData\Roaming\231\231.exe" MD5: 9C4DCCD93AE4440B5DBC580A85F53B94)
    • 231.exe (PID: 6496 cmdline: C:\Users\user\AppData\Roaming\231\231.exe MD5: 9C4DCCD93AE4440B5DBC580A85F53B94)
  • 231.exe (PID: 5000 cmdline: "C:\Users\user\AppData\Roaming\231\231.exe" MD5: 9C4DCCD93AE4440B5DBC580A85F53B94)
  • 231.exe (PID: 6908 cmdline: "C:\Users\user\AppData\Roaming\231\231.exe" MD5: 9C4DCCD93AE4440B5DBC580A85F53B94)
    • 231.exe (PID: 476 cmdline: C:\Users\user\AppData\Roaming\231\231.exe MD5: 9C4DCCD93AE4440B5DBC580A85F53B94)
  • cleanup
{"C2 url": "https://api.telegram.org/bot1338829993:AAGkgJ80sLaIYwBfp79Ps5EtdSP1XH6jBV8/sendMessage"}
{"Exfil Mode": "Telegram", "Chat id": "-449207656", "Chat URL": "https://api.telegram.org/bot1338829993:AAGkgJ80sLaIYwBfp79Ps5EtdSP1XH6jBV8/sendDocument"}
SourceRuleDescriptionAuthorStrings
00000001.00000000.253607505.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000000.253607505.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      0000001B.00000002.515903120.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000001B.00000002.515903120.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          0000001A.00000002.367814812.00000000037D9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 59 entries
            SourceRuleDescriptionAuthorStrings
            27.0.231.exe.400000.10.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              27.0.231.exe.400000.10.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                27.0.231.exe.400000.10.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  27.0.231.exe.400000.10.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                  • 0x30433:$s1: get_kbok
                  • 0x30d67:$s2: get_CHoo
                  • 0x319c2:$s3: set_passwordIsSet
                  • 0x30237:$s4: get_enableLog
                  • 0x34957:$s8: torbrowser
                  • 0x3333a:$s10: logins
                  • 0x32c08:$s11: credential
                  • 0x2f622:$g1: get_Clipboard
                  • 0x2f630:$g2: get_Keyboard
                  • 0x2f63d:$g3: get_Password
                  • 0x30c15:$g4: get_CtrlKeyDown
                  • 0x30c25:$g5: get_ShiftKeyDown
                  • 0x30c36:$g6: get_AltKeyDown
                  21.0.231.exe.400000.8.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 109 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.6.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "-449207656", "Chat URL": "https://api.telegram.org/bot1338829993:AAGkgJ80sLaIYwBfp79Ps5EtdSP1XH6jBV8/sendDocument"}
                    Source: 231.exe.6908.26.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot1338829993:AAGkgJ80sLaIYwBfp79Ps5EtdSP1XH6jBV8/sendMessage"}
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeVirustotal: Detection: 51%Perma Link
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeReversingLabs: Detection: 80%
                    Source: C:\Users\user\AppData\Roaming\231\231.exeReversingLabs: Detection: 80%
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\AppData\Roaming\231\231.exeJoe Sandbox ML: detected
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 27.0.231.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 27.2.231.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 27.0.231.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 21.0.231.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 21.0.231.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 27.0.231.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 27.0.231.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 21.0.231.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 27.0.231.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 21.0.231.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 21.2.231.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 21.0.231.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

                    Networking

                    barindex
                    Source: Yara matchFile source: 27.0.231.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.0.231.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.0.231.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.231.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.2.231.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.0.231.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.231.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.231.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.0.231.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.450ed30.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.44d9510.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.231.exe.3909510.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 26.2.231.exe.380ed30.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.0.231.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.2.231.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.231.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 26.2.231.exe.37d9510.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.231.exe.393ed30.1.raw.unpack, type: UNPACKEDPE
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000001.00000002.518792616.0000000002901000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 00000015.00000002.371598282.0000000003061000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: 231.exe, 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: 231.exe, 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://kjcOuF.com
                    Source: 231.exe, 231.exe, 0000001B.00000000.354938229.0000000000FE2000.00000002.00000001.01000000.00000008.sdmp, VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 231.exe.1.drString found in binary or memory: http://sawebservice.red-gate.com/
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 231.exe.1.drString found in binary or memory: http://www.smartassembly.com/webservices/Reporting/
                    Source: 231.exe, 231.exe, 0000001B.00000000.354938229.0000000000FE2000.00000002.00000001.01000000.00000008.sdmp, VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 231.exe.1.drString found in binary or memory: http://www.smartassembly.com/webservices/Reporting/UploadReport2
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 231.exe.1.drString found in binary or memory: http://www.smartassembly.com/webservices/UploadReportLogin/
                    Source: 231.exe, 231.exe, 0000001B.00000000.354938229.0000000000FE2000.00000002.00000001.01000000.00000008.sdmp, VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 231.exe.1.drString found in binary or memory: http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000000.00000002.261040909.00000000044D9000.00000004.00000800.00020000.00000000.sdmp, VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000001.00000000.253607505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, 231.exe, 00000014.00000002.346293586.0000000003909000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 00000015.00000000.340208778.0000000000402000.00000040.00000400.00020000.00000000.sdmp, 231.exe, 0000001A.00000002.367814812.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 0000001B.00000002.515903120.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1338829993:AAGkgJ80sLaIYwBfp79Ps5EtdSP1XH6jBV8/
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000001.00000002.518792616.0000000002901000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 00000015.00000002.371598282.0000000003061000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1338829993:AAGkgJ80sLaIYwBfp79Ps5EtdSP1XH6jBV8/sendDocumentdocument-----
                    Source: 231.exeString found in binary or memory: https://dsssdsa.fa
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 231.exe.1.drString found in binary or memory: https://dsssdsa.fa)Uri
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000000.00000002.261040909.00000000044D9000.00000004.00000800.00020000.00000000.sdmp, VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000001.00000000.253607505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, 231.exe, 00000014.00000002.346293586.0000000003909000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 00000015.00000000.340208778.0000000000402000.00000040.00000400.00020000.00000000.sdmp, 231.exe, 0000001A.00000002.367814812.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 0000001B.00000002.515903120.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000001.00000002.518792616.0000000002901000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 00000015.00000002.371598282.0000000003061000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeCode function: 1_2_00BECF50 SetWindowsHookExW 0000000D,00000000,?,?
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000000.00000002.260674158.000000000169B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeWindow created: window name: CLIPBRDWNDCLASS
                    Source: C:\Users\user\AppData\Roaming\231\231.exeWindow created: window name: CLIPBRDWNDCLASS

                    System Summary

                    barindex
                    Source: 27.0.231.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 21.0.231.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 21.0.231.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 27.0.231.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 20.2.231.exe.393ed30.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 27.2.231.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 21.0.231.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 27.0.231.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 27.0.231.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.44d9510.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 21.0.231.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 26.2.231.exe.37d9510.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.450ed30.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.44d9510.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 20.2.231.exe.3909510.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 26.2.231.exe.380ed30.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 21.0.231.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 21.2.231.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 27.0.231.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 26.2.231.exe.380ed30.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 26.2.231.exe.37d9510.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 20.2.231.exe.3909510.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 20.2.231.exe.393ed30.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.450ed30.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 00000001.00000002.518792616.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 00000015.00000002.371598282.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe PID: 6472, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: 231.exe PID: 6496, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: 231.exe PID: 476, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: initial sampleStatic PE information: Filename: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.6.unpack, u003cPrivateImplementationDetailsu003eu007bA17F9E4Bu002dB23Eu002d4670u002d8522u002d97B1B11F19F6u007d/u0031054D6EEu002d42AFu002d424Au002d9F3Au002dCB1C9BDFFA8C.csLarge array initialization: .cctor: array initializer size 11788
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.10.unpack, u003cPrivateImplementationDetailsu003eu007bA17F9E4Bu002dB23Eu002d4670u002d8522u002d97B1B11F19F6u007d/u0031054D6EEu002d42AFu002d424Au002d9F3Au002dCB1C9BDFFA8C.csLarge array initialization: .cctor: array initializer size 11788
                    Source: 1.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bA17F9E4Bu002dB23Eu002d4670u002d8522u002d97B1B11F19F6u007d/u0031054D6EEu002d42AFu002d424Au002d9F3Au002dCB1C9BDFFA8C.csLarge array initialization: .cctor: array initializer size 11788
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.12.unpack, u003cPrivateImplementationDetailsu003eu007bA17F9E4Bu002dB23Eu002d4670u002d8522u002d97B1B11F19F6u007d/u0031054D6EEu002d42AFu002d424Au002d9F3Au002dCB1C9BDFFA8C.csLarge array initialization: .cctor: array initializer size 11788
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 27.0.231.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 21.0.231.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 21.0.231.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 27.0.231.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 20.2.231.exe.393ed30.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 27.2.231.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 21.0.231.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 27.0.231.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 27.0.231.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.44d9510.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 21.0.231.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 26.2.231.exe.37d9510.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.450ed30.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.44d9510.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 20.2.231.exe.3909510.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 26.2.231.exe.380ed30.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 21.0.231.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 21.2.231.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 27.0.231.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 26.2.231.exe.380ed30.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 26.2.231.exe.37d9510.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 20.2.231.exe.3909510.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 20.2.231.exe.393ed30.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.450ed30.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 00000001.00000002.518792616.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 00000015.00000002.371598282.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe PID: 6472, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: 231.exe PID: 6496, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: 231.exe PID: 476, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeCode function: 1_2_00B7AEC8
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeCode function: 1_2_00B75F60
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeCode function: 1_2_00BE2AE8
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeCode function: 1_2_00BE6378
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeCode function: 1_2_00BEC400
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeCode function: 1_2_00BE1DE0
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeCode function: 1_2_00BE4EA8
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeCode function: 1_2_00BEC1E0
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeCode function: 1_2_00BE52C8
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeCode function: 1_2_00BED6D8
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeCode function: 1_2_00CA46E0
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeCode function: 1_2_00CA3604
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeCode function: 1_2_00CA45F0
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 21_2_02F246E0
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 21_2_02F246D2
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 21_2_02F24630
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 21_2_02F2D350
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 21_2_0635973C
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 21_2_06357530
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 21_2_063590F0
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 21_2_06356918
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 21_2_06355FFC
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 21_2_06356C60
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 27_2_01B546E0
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 27_2_01B545F0
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 27_2_01B546B2
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 27_2_01B5D350
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 27_2_065A7530
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 27_2_065A90F0
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 27_2_065A6918
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 27_2_065A6C60
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeCode function: 0_2_01682F00 CreateProcessAsUserA,
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000000.00000002.260982705.00000000034D1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLWABKHloeNeCwdHNjMDwbOzZQvZZLLbKL.exe4 vs VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000000.00000002.260674158.000000000169B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000000.00000002.261040909.00000000044D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLWABKHloeNeCwdHNjMDwbOzZQvZZLLbKL.exe4 vs VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000001.00000000.253647167.0000000000438000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLWABKHloeNeCwdHNjMDwbOzZQvZZLLbKL.exe4 vs VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000001.00000002.516701121.00000000008F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: 231.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: 231.exe.1.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeSection loaded: sfc.dll
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeSection loaded: sfc.dll
                    Source: C:\Users\user\AppData\Roaming\231\231.exeSection loaded: sfc.dll
                    Source: C:\Users\user\AppData\Roaming\231\231.exeSection loaded: sfc.dll
                    Source: C:\Users\user\AppData\Roaming\231\231.exeSection loaded: sfc.dll
                    Source: C:\Users\user\AppData\Roaming\231\231.exeSection loaded: sfc.dll
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: 231.exe.1.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeVirustotal: Detection: 51%
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeReversingLabs: Detection: 80%
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeFile read: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeJump to behavior
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: unknownProcess created: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe "C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe"
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess created: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\231\231.exe "C:\Users\user\AppData\Roaming\231\231.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\231\231.exe "C:\Users\user\AppData\Roaming\231\231.exe"
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess created: C:\Users\user\AppData\Roaming\231\231.exe C:\Users\user\AppData\Roaming\231\231.exe
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\231\231.exe "C:\Users\user\AppData\Roaming\231\231.exe"
                    Source: unknownProcess created: C:\Users\user\AppData\Roaming\231\231.exe "C:\Users\user\AppData\Roaming\231\231.exe"
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess created: C:\Users\user\AppData\Roaming\231\231.exe C:\Users\user\AppData\Roaming\231\231.exe
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess created: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess created: C:\Users\user\AppData\Roaming\231\231.exe C:\Users\user\AppData\Roaming\231\231.exe
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess created: C:\Users\user\AppData\Roaming\231\231.exe C:\Users\user\AppData\Roaming\231\231.exe
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\231\231.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\231\231.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.logJump to behavior
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@11/4@0/1
                    Source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.fb0000.0.unpack, u000fu0005/u0095u0005.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.510000.1.unpack, u000fu0005/u0095u0005.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                    Source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.510000.3.unpack, u000fu0005/u0095u0005.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, u000fu0005/u0095u0005.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                    Source: 0.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.fb0000.0.unpack, u000fu0005/u0095u0005.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                    Source: 231.exe.1.dr, u000fu0005/u0095u0005.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                    Source: 1.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.510000.1.unpack, u000fu0005/u0095u0005.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Roaming\231\231.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Roaming\231\231.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Roaming\231\231.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: C:\Users\user\AppData\Roaming\231\231.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, u0097/u0005u0002.csCryptographic APIs: 'CreateDecryptor'
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, u0097/u0005u0002.csCryptographic APIs: 'TransformFinalBlock'
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, u001a/u008eu001a.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                    Source: 0.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.fb0000.0.unpack, u0097/u0005u0002.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.fb0000.0.unpack, u0097/u0005u0002.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.fb0000.0.unpack, u001a/u008eu001a.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                    Source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.fb0000.0.unpack, u0097/u0005u0002.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.fb0000.0.unpack, u0097/u0005u0002.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.fb0000.0.unpack, u001a/u008eu001a.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 21_2_0635A61F push es; iretd
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 27_2_065AA61F push es; iretd
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 27_2_065A8532 push es; ret
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 27_2_065AC080 push es; ret
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.7588479864
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.7588479864
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeFile created: \van nang tech-h#u00e0ng h#u00f3a y#u00eau c#u1ea7u_order rfq 2209865.exe
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeFile created: \van nang tech-h#u00e0ng h#u00f3a y#u00eau c#u1ea7u_order rfq 2209865.exe
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeFile created: C:\Users\user\AppData\Roaming\231\231.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run 231Jump to behavior
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run 231Jump to behavior
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run 231Jump to behavior

                    Hooking and other Techniques for Hiding and Protection

                    barindex
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeFile opened: C:\Users\user\AppData\Roaming\231\231.exe:Zone.Identifier read attributes | delete
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\231\231.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Roaming\231\231.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\231\231.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\AppData\Roaming\231\231.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe TID: 6468Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe TID: 6848Thread sleep count: 44 > 30
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe TID: 6848Thread sleep time: -40582836962160988s >= -30000s
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe TID: 6852Thread sleep count: 3813 > 30
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe TID: 6852Thread sleep count: 5983 > 30
                    Source: C:\Users\user\AppData\Roaming\231\231.exe TID: 3336Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\231\231.exe TID: 1892Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\231\231.exe TID: 1896Thread sleep count: 397 > 30
                    Source: C:\Users\user\AppData\Roaming\231\231.exe TID: 1896Thread sleep count: 179 > 30
                    Source: C:\Users\user\AppData\Roaming\231\231.exe TID: 2136Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\231\231.exe TID: 4816Thread sleep count: 31 > 30
                    Source: C:\Users\user\AppData\Roaming\231\231.exe TID: 4816Thread sleep time: -28592453314249787s >= -30000s
                    Source: C:\Users\user\AppData\Roaming\231\231.exe TID: 4724Thread sleep count: 7866 > 30
                    Source: C:\Users\user\AppData\Roaming\231\231.exe TID: 4724Thread sleep count: 1862 > 30
                    Source: C:\Users\user\AppData\Roaming\231\231.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\231\231.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\231\231.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\231\231.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\231\231.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeWindow / User API: threadDelayed 3813
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeWindow / User API: threadDelayed 5983
                    Source: C:\Users\user\AppData\Roaming\231\231.exeWindow / User API: threadDelayed 397
                    Source: C:\Users\user\AppData\Roaming\231\231.exeWindow / User API: threadDelayed 7866
                    Source: C:\Users\user\AppData\Roaming\231\231.exeWindow / User API: threadDelayed 1862
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\231\231.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\AppData\Roaming\231\231.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess information queried: ProcessInformation
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\231\231.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\231\231.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\231\231.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\AppData\Roaming\231\231.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess token adjusted: Debug
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess token adjusted: Debug
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeCode function: 1_2_00BE2490 LdrInitializeThunk,
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeMemory written: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\AppData\Roaming\231\231.exeMemory written: C:\Users\user\AppData\Roaming\231\231.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\AppData\Roaming\231\231.exeMemory written: C:\Users\user\AppData\Roaming\231\231.exe base: 400000 value starts with: 4D5A
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeProcess created: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess created: C:\Users\user\AppData\Roaming\231\231.exe C:\Users\user\AppData\Roaming\231\231.exe
                    Source: C:\Users\user\AppData\Roaming\231\231.exeProcess created: C:\Users\user\AppData\Roaming\231\231.exe C:\Users\user\AppData\Roaming\231\231.exe
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeQueries volume information: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe VolumeInformation
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeQueries volume information: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe VolumeInformation
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Users\user\AppData\Roaming\231\231.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Users\user\AppData\Roaming\231\231.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Users\user\AppData\Roaming\231\231.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Users\user\AppData\Roaming\231\231.exe VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                    Source: C:\Users\user\AppData\Roaming\231\231.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                    Source: C:\Users\user\AppData\Roaming\231\231.exeCode function: 21_2_063563F4 GetUserNameW,

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000001.00000002.518792616.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.371598282.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe PID: 6472, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 231.exe PID: 6496, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 231.exe PID: 476, type: MEMORYSTR
                    Source: Yara matchFile source: 27.0.231.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.0.231.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.0.231.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.231.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.231.exe.393ed30.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.2.231.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.0.231.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.231.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.231.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.44d9510.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.0.231.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 26.2.231.exe.37d9510.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.450ed30.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.44d9510.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.231.exe.3909510.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 26.2.231.exe.380ed30.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.0.231.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.2.231.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.231.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 26.2.231.exe.380ed30.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 26.2.231.exe.37d9510.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.231.exe.3909510.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.231.exe.393ed30.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.450ed30.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000000.253607505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.515903120.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001A.00000002.367814812.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.356681363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000000.340208778.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.370461628.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.254906680.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.355665401.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000000.339810964.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.515882418.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.346293586.0000000003909000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000000.339477661.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.253095019.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.261040909.00000000044D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.356011581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.254062993.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.356342873.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000000.339160538.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.518792616.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.519047597.00000000029B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.371598282.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe PID: 6448, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe PID: 6472, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 231.exe PID: 6744, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 231.exe PID: 6496, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 231.exe PID: 6908, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 231.exe PID: 476, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: Yara matchFile source: 00000001.00000002.518792616.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.371598282.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe PID: 6472, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 231.exe PID: 6496, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 231.exe PID: 476, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 00000001.00000002.518792616.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.371598282.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe PID: 6472, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 231.exe PID: 6496, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 231.exe PID: 476, type: MEMORYSTR
                    Source: Yara matchFile source: 27.0.231.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.0.231.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.0.231.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.231.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.231.exe.393ed30.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.2.231.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.0.231.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.231.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.231.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.44d9510.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.0.231.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 26.2.231.exe.37d9510.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.450ed30.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.44d9510.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.231.exe.3909510.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 26.2.231.exe.380ed30.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.0.231.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 21.2.231.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 27.0.231.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 26.2.231.exe.380ed30.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 26.2.231.exe.37d9510.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.231.exe.3909510.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 20.2.231.exe.393ed30.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.450ed30.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000000.253607505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.515903120.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001A.00000002.367814812.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.356681363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000000.340208778.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.370461628.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.254906680.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.355665401.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000000.339810964.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.515882418.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000014.00000002.346293586.0000000003909000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000000.339477661.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.253095019.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.261040909.00000000044D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.356011581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.254062993.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000000.356342873.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000000.339160538.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.518792616.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.519047597.00000000029B0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000015.00000002.371598282.0000000003061000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe PID: 6448, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe PID: 6472, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 231.exe PID: 6744, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 231.exe PID: 6496, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 231.exe PID: 6908, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: 231.exe PID: 476, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    1
                    Valid Accounts
                    211
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    1
                    Account Discovery
                    Remote Services11
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/Job1
                    Valid Accounts
                    1
                    Valid Accounts
                    1
                    Deobfuscate/Decode Files or Information
                    211
                    Input Capture
                    114
                    System Information Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)11
                    Registry Run Keys / Startup Folder
                    1
                    Access Token Manipulation
                    2
                    Obfuscated Files or Information
                    Security Account Manager21
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    Automated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)111
                    Process Injection
                    3
                    Software Packing
                    NTDS1
                    Process Discovery
                    Distributed Component Object Model211
                    Input Capture
                    Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon Script11
                    Registry Run Keys / Startup Folder
                    1
                    DLL Side-Loading
                    LSA Secrets131
                    Virtualization/Sandbox Evasion
                    SSH1
                    Clipboard Data
                    Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common1
                    Masquerading
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                    Valid Accounts
                    DCSync1
                    System Owner/User Discovery
                    Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                    Access Token Manipulation
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)131
                    Virtualization/Sandbox Evasion
                    /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                    Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)111
                    Process Injection
                    Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                    Compromise Software Dependencies and Development ToolsWindows Command ShellCronCron1
                    Hidden Files and Directories
                    Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 signatures2 2 Behavior Graph ID: 635135 Sample: VAN NANG TECH-H#U00e0ng h#U... Startdate: 27/05/2022 Architecture: WINDOWS Score: 100 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 9 other signatures 2->47 6 VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe 1 2->6         started        10 231.exe 2->10         started        12 231.exe 2->12         started        14 2 other processes 2->14 process3 file4 29 VAN NANG TECH-H#U0...RFQ 2209865.exe.log, ASCII 6->29 dropped 49 Injects a PE file into a foreign processes 6->49 16 VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe 2 5 6->16         started        51 Multi AV Scanner detection for dropped file 10->51 53 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 10->53 55 Machine Learning detection for dropped file 10->55 57 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 10->57 20 231.exe 2 12->20         started        23 231.exe 2 14->23         started        signatures5 process6 dnsIp7 25 C:\Users\user\AppData\Roaming\231\231.exe, PE32 16->25 dropped 27 C:\Users\user\...\231.exe:Zone.Identifier, ASCII 16->27 dropped 33 Tries to steal Mail credentials (via file / registry access) 16->33 35 Creates autostart registry keys with suspicious names 16->35 37 Tries to harvest and steal browser information (history, passwords, etc) 16->37 39 2 other signatures 16->39 31 192.168.2.1 unknown unknown 20->31 file8 signatures9

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe51%VirustotalBrowse
                    VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe81%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Roaming\231\231.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Roaming\231\231.exe81%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    SourceDetectionScannerLabelLinkDownload
                    1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    27.0.231.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    27.2.231.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    1.2.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    27.0.231.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    21.0.231.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    21.0.231.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    27.0.231.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    27.0.231.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    21.0.231.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    27.0.231.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    21.0.231.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    21.2.231.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    21.0.231.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    1.0.VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://dsssdsa.fa)Uri0%Avira URL Cloudsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    http://www.smartassembly.com/webservices/Reporting/UploadReport20%URL Reputationsafe
                    https://dsssdsa.fa0%Avira URL Cloudsafe
                    http://www.smartassembly.com/webservices/Reporting/0%URL Reputationsafe
                    http://kjcOuF.com0%Avira URL Cloudsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    http://www.smartassembly.com/webservices/UploadReportLogin/0%URL Reputationsafe
                    http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL0%URL Reputationsafe
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://dsssdsa.fa)UriVAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 231.exe.1.drfalse
                    • Avira URL Cloud: safe
                    low
                    http://127.0.0.1:HTTP/1.1VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000001.00000002.518792616.0000000002901000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 00000015.00000002.371598282.0000000003061000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://DynDns.comDynDNS231.exe, 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haVAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000001.00000002.518792616.0000000002901000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 00000015.00000002.371598282.0000000003061000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.telegram.org/bot1338829993:AAGkgJ80sLaIYwBfp79Ps5EtdSP1XH6jBV8/sendDocumentdocument-----VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000001.00000002.518792616.0000000002901000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 00000015.00000002.371598282.0000000003061000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://sawebservice.red-gate.com/231.exe, 231.exe, 0000001B.00000000.354938229.0000000000FE2000.00000002.00000001.01000000.00000008.sdmp, VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 231.exe.1.drfalse
                        high
                        http://www.smartassembly.com/webservices/Reporting/UploadReport2231.exe, 231.exe, 0000001B.00000000.354938229.0000000000FE2000.00000002.00000001.01000000.00000008.sdmp, VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 231.exe.1.drfalse
                        • URL Reputation: safe
                        unknown
                        https://dsssdsa.fa231.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.smartassembly.com/webservices/Reporting/VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 231.exe.1.drfalse
                        • URL Reputation: safe
                        unknown
                        http://kjcOuF.com231.exe, 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipVAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000000.00000002.261040909.00000000044D9000.00000004.00000800.00020000.00000000.sdmp, VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000001.00000000.253607505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, 231.exe, 00000014.00000002.346293586.0000000003909000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 00000015.00000000.340208778.0000000000402000.00000040.00000400.00020000.00000000.sdmp, 231.exe, 0000001A.00000002.367814812.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 0000001B.00000002.515903120.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.smartassembly.com/webservices/UploadReportLogin/VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 231.exe.1.drfalse
                        • URL Reputation: safe
                        unknown
                        http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL231.exe, 231.exe, 0000001B.00000000.354938229.0000000000FE2000.00000002.00000001.01000000.00000008.sdmp, VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 231.exe.1.drfalse
                        • URL Reputation: safe
                        unknown
                        https://api.telegram.org/bot1338829993:AAGkgJ80sLaIYwBfp79Ps5EtdSP1XH6jBV8/VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000000.00000002.261040909.00000000044D9000.00000004.00000800.00020000.00000000.sdmp, VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe, 00000001.00000000.253607505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, 231.exe, 00000014.00000002.346293586.0000000003909000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 00000015.00000000.340208778.0000000000402000.00000040.00000400.00020000.00000000.sdmp, 231.exe, 0000001A.00000002.367814812.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, 231.exe, 0000001B.00000002.515903120.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          IP
                          192.168.2.1
                          Joe Sandbox Version:34.0.0 Boulder Opal
                          Analysis ID:635135
                          Start date and time: 27/05/202215:34:082022-05-27 15:34:08 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 12m 31s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:37
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:1
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@11/4@0/1
                          EGA Information:
                          • Successful, ratio: 75%
                          HDC Information:
                          • Successful, ratio: 1% (good quality ratio 0.8%)
                          • Quality average: 67.1%
                          • Quality standard deviation: 37.1%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Adjust boot time
                          • Enable AMSI
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, BackgroundTransferHost.exe, consent.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                          • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                          • Execution Graph export aborted for target 231.exe, PID 5000 because there are no executed function
                          • Execution Graph export aborted for target 231.exe, PID 6296 because there are no executed function
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          TimeTypeDescription
                          15:35:28API Interceptor730x Sleep call for process: VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe modified
                          15:35:40AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run 231 C:\Users\user\AppData\Roaming\231\231.exe
                          15:35:48AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run 231 C:\Users\user\AppData\Roaming\231\231.exe
                          15:36:08API Interceptor396x Sleep call for process: 231.exe modified
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Users\user\AppData\Roaming\231\231.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):520
                          Entropy (8bit):5.345981753770044
                          Encrypted:false
                          SSDEEP:12:Q3La/hhkvoDLI4MWuCqDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhav:MLUE4K5E4Ks2wKDE4KhK3VZ9pKhk
                          MD5:044A637E42FE9A819D7E43C8504CA769
                          SHA1:6FCA27B1A571B73563C8424C84F4F64F3CBCBE2F
                          SHA-256:E88E04654826CE00CC7A840745254164DDBD175066D6E4EA6858BF0FE463EBB4
                          SHA-512:C9A74FA4154FA5E5951B0EEAC5330CA4BAC981FF9AD24C08575A76AD5D99CFB68556B9857C9C8209A1BFCB43F82E00F14962987A18A92A715F45AD0D4E4A718C
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                          Process:C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):520
                          Entropy (8bit):5.345981753770044
                          Encrypted:false
                          SSDEEP:12:Q3La/hhkvoDLI4MWuCqDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhav:MLUE4K5E4Ks2wKDE4KhK3VZ9pKhk
                          MD5:044A637E42FE9A819D7E43C8504CA769
                          SHA1:6FCA27B1A571B73563C8424C84F4F64F3CBCBE2F
                          SHA-256:E88E04654826CE00CC7A840745254164DDBD175066D6E4EA6858BF0FE463EBB4
                          SHA-512:C9A74FA4154FA5E5951B0EEAC5330CA4BAC981FF9AD24C08575A76AD5D99CFB68556B9857C9C8209A1BFCB43F82E00F14962987A18A92A715F45AD0D4E4A718C
                          Malicious:true
                          Reputation:moderate, very likely benign file
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                          Process:C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Category:dropped
                          Size (bytes):316416
                          Entropy (8bit):7.709057445187231
                          Encrypted:false
                          SSDEEP:6144:0n5tMcEzK2WHKjlc+m5+n9X029Vx+7HIuEmQEBYOqgHwWg4bR2:0n5tMVu6W+m5EERQ1gQWLR
                          MD5:9C4DCCD93AE4440B5DBC580A85F53B94
                          SHA1:C9CAA8238FC581CE3504A8513A2E3EE4701E9274
                          SHA-256:78990521B8FD82B6F0EAE446FC6D3F4763764BD85F8820DC7D0A3EEB50D8933B
                          SHA-512:B0AD33F099EB3EB31131AF80C4D72838E7923373D1B114BD2591A69C0BED73A5CA00FB26A1ED19F76020399D6CA90A91C581A7044D2404EA294657DC5C56A981
                          Malicious:true
                          Antivirus:
                          • Antivirus: Joe Sandbox ML, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 81%
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..b................................. ........@.. ....................... ............@.................................}...J.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H....... ....w...........%...............................................0..d........-=r...p+7+<+=+>+C.+C+ +B+C.+C.,..o.....(......%,.X.-....,...i2.*s....+..+..+.o....+..+..+..+..+..+..0.._.......+2+3,.+6.+6.-..,.+.+3,.r...p+-z.-.+.+/.-.,.+/.(....*.+.(....+..+.(....+..+.s....+..+.(....+..+...0..X........-.++.-/&+/r5..p+++0rI..p+,.-..-.++.G.1...+%.-.*s....+..+..+.o....+..+.o....+..+.o....+..0..........+.+.+.+.*s....+..+..+.o....+.....+.&*(....+..0..........rQ..prq..p8....&r...
                          Process:C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:modified
                          Size (bytes):26
                          Entropy (8bit):3.95006375643621
                          Encrypted:false
                          SSDEEP:3:ggPYV:rPYV
                          MD5:187F488E27DB4AF347237FE461A079AD
                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                          Malicious:true
                          Reputation:high, very likely benign file
                          Preview:[ZoneTransfer]....ZoneId=0
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):7.709057445187231
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                          • Win32 Executable (generic) a (10002005/4) 49.78%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          • DOS Executable Generic (2002/1) 0.01%
                          File name:VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                          File size:316416
                          MD5:9c4dccd93ae4440b5dbc580a85f53b94
                          SHA1:c9caa8238fc581ce3504a8513a2e3ee4701e9274
                          SHA256:78990521b8fd82b6f0eae446fc6d3f4763764bd85f8820dc7d0a3eeb50d8933b
                          SHA512:b0ad33f099eb3eb31131af80c4d72838e7923373d1b114bd2591a69c0bed73a5ca00fb26a1ed19f76020399d6ca90a91c581a7044d2404ea294657dc5c56a981
                          SSDEEP:6144:0n5tMcEzK2WHKjlc+m5+n9X029Vx+7HIuEmQEBYOqgHwWg4bR2:0n5tMVu6W+m5EERQ1gQWLR
                          TLSH:2164021457DD9A42C6FE087AC4D204B45732A43A7CABE75FADCC112D2B337C64922B9B
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...2..b................................. ........@.. ....................... ............@................................
                          Icon Hash:a2a0b496b2caca72
                          Entrypoint:0x44d2c7
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                          Time Stamp:0x628F9F32 [Thu May 26 15:39:30 2022 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:v4.0.30319
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Instruction
                          jmp dword ptr [00402000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x4d27d0x4a.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x4e0000x1b02.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x500000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000x4b2cd0x4b400False0.850991486711data7.7588479864IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                          .rsrc0x4e0000x1b020x1c00False0.322684151786data4.27348228895IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x500000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountry
                          RT_ICON0x4e0840x128GLS_BINARY_LSB_FIRST
                          RT_ICON0x4e1d00x568GLS_BINARY_LSB_FIRST
                          RT_ICON0x4e75c0x2e8data
                          RT_ICON0x4ea680x8a8data
                          RT_GROUP_ICON0x4f35e0x3edata
                          RT_VERSION0x4f3d80x4f4data
                          RT_MANIFEST0x4f9080x1faXML 1.0 document, ASCII text, with very long lines, with no line terminators
                          DLLImport
                          mscoree.dll_CorExeMain
                          DescriptionData
                          LegalCopyright
                          FileVersion
                          CompanyNameSoftOrbits
                          CommentsThis installation was built with Inno Setup.
                          ProductNameAdd Text to Video PRO
                          ProductVersion1.4
                          FileDescriptionAdd Text to Video PRO Setup
                          Translation0x0000 0x04b0
                          No network behavior found

                          Click to jump to process

                          Target ID:0
                          Start time:15:35:11
                          Start date:27/05/2022
                          Path:C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe"
                          Imagebase:0xfb0000
                          File size:316416 bytes
                          MD5 hash:9C4DCCD93AE4440B5DBC580A85F53B94
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.261040909.00000000044D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.261040909.00000000044D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:1
                          Start time:15:35:13
                          Start date:27/05/2022
                          Path:C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\VAN NANG TECH-H#U00e0ng h#U00f3a y#U00eau c#U1ea7u_order RFQ 2209865.exe
                          Imagebase:0x510000
                          File size:316416 bytes
                          MD5 hash:9C4DCCD93AE4440B5DBC580A85F53B94
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.253607505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.253607505.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.254906680.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.254906680.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.518792616.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.518792616.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.518792616.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000001.00000002.518792616.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.519047597.00000000029B0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.515882418.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.515882418.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.253095019.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.253095019.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.254062993.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.254062993.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:15
                          Start time:15:35:48
                          Start date:27/05/2022
                          Path:C:\Users\user\AppData\Roaming\231\231.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\AppData\Roaming\231\231.exe"
                          Imagebase:0xce0000
                          File size:316416 bytes
                          MD5 hash:9C4DCCD93AE4440B5DBC580A85F53B94
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Antivirus matches:
                          • Detection: 100%, Joe Sandbox ML
                          • Detection: 81%, ReversingLabs
                          Reputation:low

                          Target ID:20
                          Start time:15:35:52
                          Start date:27/05/2022
                          Path:C:\Users\user\AppData\Roaming\231\231.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\231\231.exe"
                          Imagebase:0x390000
                          File size:316416 bytes
                          MD5 hash:9C4DCCD93AE4440B5DBC580A85F53B94
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000014.00000002.346293586.0000000003909000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000014.00000002.346293586.0000000003909000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:21
                          Start time:15:35:53
                          Start date:27/05/2022
                          Path:C:\Users\user\AppData\Roaming\231\231.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\AppData\Roaming\231\231.exe
                          Imagebase:0xd90000
                          File size:316416 bytes
                          MD5 hash:9C4DCCD93AE4440B5DBC580A85F53B94
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000015.00000000.340208778.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000015.00000000.340208778.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000015.00000002.370461628.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000015.00000002.370461628.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000015.00000000.339810964.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000015.00000000.339810964.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000015.00000000.339477661.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000015.00000000.339477661.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000015.00000000.339160538.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000015.00000000.339160538.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000015.00000002.371598282.0000000003061000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000015.00000002.371598282.0000000003061000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000015.00000002.371598282.0000000003061000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000015.00000002.371598282.0000000003061000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                          Reputation:low

                          Target ID:22
                          Start time:15:35:57
                          Start date:27/05/2022
                          Path:C:\Users\user\AppData\Roaming\231\231.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\AppData\Roaming\231\231.exe"
                          Imagebase:0x570000
                          File size:316416 bytes
                          MD5 hash:9C4DCCD93AE4440B5DBC580A85F53B94
                          Has elevated privileges:false
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:low

                          Target ID:26
                          Start time:15:35:59
                          Start date:27/05/2022
                          Path:C:\Users\user\AppData\Roaming\231\231.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\AppData\Roaming\231\231.exe"
                          Imagebase:0x2e0000
                          File size:316416 bytes
                          MD5 hash:9C4DCCD93AE4440B5DBC580A85F53B94
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001A.00000002.367814812.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000001A.00000002.367814812.00000000037D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:27
                          Start time:15:36:01
                          Start date:27/05/2022
                          Path:C:\Users\user\AppData\Roaming\231\231.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\AppData\Roaming\231\231.exe
                          Imagebase:0xfe0000
                          File size:316416 bytes
                          MD5 hash:9C4DCCD93AE4440B5DBC580A85F53B94
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001B.00000002.515903120.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000001B.00000002.515903120.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001B.00000000.356681363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000001B.00000000.356681363.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001B.00000000.355665401.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000001B.00000000.355665401.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001B.00000000.356011581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000001B.00000000.356011581.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001B.00000000.356342873.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000001B.00000000.356342873.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 0000001B.00000002.518793277.0000000003381000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                          Reputation:low

                          No disassembly