Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FqjWpTMVBm

Overview

General Information

Sample Name:FqjWpTMVBm (renamed file extension from none to exe)
Analysis ID:679161
MD5:f8b75a887b9774203f7d77de434f40ea
SHA1:e19add1ef9b87ef54de6870b229cfbcaaeddb0fa
SHA256:de373cb42386f956133546049fa24b0ec459a78c7e667c9d05c366c198b680b3
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Antivirus / Scanner detection for submitted sample
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
.NET source code references suspicious native API functions
Machine Learning detection for sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
PE / OLE file has an invalid certificate
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • FqjWpTMVBm.exe (PID: 5068 cmdline: "C:\Users\user\Desktop\FqjWpTMVBm.exe" MD5: F8B75A887B9774203F7D77DE434F40EA)
    • cvtres.exe (PID: 2980 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe MD5: C09985AE74F0882F208D75DE27770DFA)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "contacto@tycautomotriz.cl", "Password": "tycautomotriz2020", "Host": "mail.tycautomotriz.cl"}
SourceRuleDescriptionAuthorStrings
00000002.00000000.373575216.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000000.373575216.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000002.00000000.373575216.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x2fcaa:$a13: get_DnsResolver
      • 0x2e4ca:$a20: get_LastAccessed
      • 0x30628:$a27: set_InternalServerPort
      • 0x30960:$a30: set_GuidMasterKey
      • 0x2e5d1:$a33: get_Clipboard
      • 0x2e5df:$a34: get_Keyboard
      • 0x2f8dd:$a35: get_ShiftKeyDown
      • 0x2f8ee:$a36: get_AltKeyDown
      • 0x2e5ec:$a37: get_Password
      • 0x2f08d:$a38: get_PasswordHash
      • 0x300aa:$a39: get_DefaultCredentials
      00000002.00000000.372648537.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000000.372648537.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          Click to see the 21 entries
          SourceRuleDescriptionAuthorStrings
          2.0.cvtres.exe.400000.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            2.0.cvtres.exe.400000.4.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              2.0.cvtres.exe.400000.4.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x3277a:$s10: logins
              • 0x321e1:$s11: credential
              • 0x2e7d1:$g1: get_Clipboard
              • 0x2e7df:$g2: get_Keyboard
              • 0x2e7ec:$g3: get_Password
              • 0x2facd:$g4: get_CtrlKeyDown
              • 0x2fadd:$g5: get_ShiftKeyDown
              • 0x2faee:$g6: get_AltKeyDown
              2.0.cvtres.exe.400000.4.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x2feaa:$a13: get_DnsResolver
              • 0x2e6ca:$a20: get_LastAccessed
              • 0x30828:$a27: set_InternalServerPort
              • 0x30b60:$a30: set_GuidMasterKey
              • 0x2e7d1:$a33: get_Clipboard
              • 0x2e7df:$a34: get_Keyboard
              • 0x2fadd:$a35: get_ShiftKeyDown
              • 0x2faee:$a36: get_AltKeyDown
              • 0x2e7ec:$a37: get_Password
              • 0x2f28d:$a38: get_PasswordHash
              • 0x302aa:$a39: get_DefaultCredentials
              2.2.cvtres.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 27 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: FqjWpTMVBm.exeVirustotal: Detection: 56%Perma Link
                Source: FqjWpTMVBm.exeMetadefender: Detection: 34%Perma Link
                Source: FqjWpTMVBm.exeReversingLabs: Detection: 53%
                Source: FqjWpTMVBm.exeAvira: detected
                Source: FqjWpTMVBm.exeJoe Sandbox ML: detected
                Source: 2.2.cvtres.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 2.0.cvtres.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 2.0.cvtres.exe.400000.2.unpackAvira: Label: TR/Spy.Gen8
                Source: 2.0.cvtres.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                Source: 2.0.cvtres.exe.400000.3.unpackAvira: Label: TR/Spy.Gen8
                Source: 2.0.cvtres.exe.400000.1.unpackAvira: Label: TR/Spy.Gen8
                Source: 2.2.cvtres.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "contacto@tycautomotriz.cl", "Password": "tycautomotriz2020", "Host": "mail.tycautomotriz.cl"}
                Source: FqjWpTMVBm.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: FqjWpTMVBm.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: ZZSSACVSDFDHDJJHDG335.pdb source: FqjWpTMVBm.exe
                Source: Joe Sandbox ViewIP Address: 131.72.236.163 131.72.236.163
                Source: global trafficTCP traffic: 192.168.2.6:49767 -> 131.72.236.163:587
                Source: global trafficTCP traffic: 192.168.2.6:49767 -> 131.72.236.163:587
                Source: cvtres.exe, 00000002.00000002.634341164.0000000006FB3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: cvtres.exe, 00000002.00000002.634341164.0000000006FB3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: cvtres.exe, 00000002.00000002.634341164.0000000006FB3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://VMDVyE.com
                Source: cvtres.exe, 00000002.00000002.635170682.0000000007096000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.tycautomotriz.cl
                Source: cvtres.exe, 00000002.00000002.635170682.0000000007096000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tycautomotriz.cl
                Source: cvtres.exe, 00000002.00000002.634341164.0000000006FB3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%
                Source: cvtres.exe, 00000002.00000002.634341164.0000000006FB3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%%startupfolder%
                Source: cvtres.exe, 00000002.00000002.634341164.0000000006FB3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                Source: unknownDNS traffic detected: queries for: mail.tycautomotriz.cl
                Source: FqjWpTMVBm.exe, 00000001.00000002.375993429.00000000010CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 2.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 2.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 2.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 2.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 2.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 2.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 2.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 2.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 1.2.FqjWpTMVBm.exe.4dcb7a8.5.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 1.2.FqjWpTMVBm.exe.4dcb7a8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 1.2.FqjWpTMVBm.exe.4dcb7a8.5.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 1.2.FqjWpTMVBm.exe.4dcb7a8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 2.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 2.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 2.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 2.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000002.00000000.373575216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000002.00000000.372648537.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000002.00000000.373105695.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000002.00000002.632455150.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000002.00000000.374189805.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000001.00000002.378242847.00000000048E2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: FqjWpTMVBm.exe PID: 5068, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: cvtres.exe PID: 2980, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 2.2.cvtres.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b711C5A71u002dF4E1u002d45E1u002d90D5u002d4B8A252BB8A6u007d/u0038B73B275u002d9749u002d4406u002d994Cu002dB871A74003B2.csLarge array initialization: .cctor: array initializer size 11651
                Source: 2.0.cvtres.exe.400000.2.unpack, u003cPrivateImplementationDetailsu003eu007b711C5A71u002dF4E1u002d45E1u002d90D5u002d4B8A252BB8A6u007d/u0038B73B275u002d9749u002d4406u002d994Cu002dB871A74003B2.csLarge array initialization: .cctor: array initializer size 11651
                Source: 2.0.cvtres.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007b711C5A71u002dF4E1u002d45E1u002d90D5u002d4B8A252BB8A6u007d/u0038B73B275u002d9749u002d4406u002d994Cu002dB871A74003B2.csLarge array initialization: .cctor: array initializer size 11651
                Source: FqjWpTMVBm.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: 2.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 2.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 2.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 2.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 2.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 2.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 2.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 2.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 1.2.FqjWpTMVBm.exe.4dcb7a8.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 1.2.FqjWpTMVBm.exe.4dcb7a8.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 1.2.FqjWpTMVBm.exe.4dcb7a8.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 1.2.FqjWpTMVBm.exe.4dcb7a8.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 2.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 2.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 2.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 2.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000002.00000000.373575216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000002.00000000.372648537.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000002.00000000.373105695.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000002.00000002.632455150.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000002.00000000.374189805.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000001.00000002.378242847.00000000048E2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: FqjWpTMVBm.exe PID: 5068, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: cvtres.exe PID: 2980, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01093128
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01091D70
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_010918D8
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01097F70
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01090F98
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01092278
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_010992E8
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_010951B0
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_010951C0
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01094009
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01094018
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01090427
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01090448
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01093048
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01093041
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01097C70
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01097CB8
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01099716
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_0109972F
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01090F4C
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01099752
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_0109976B
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01097F60
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01099784
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01095BF9
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_010992D8
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_010996DF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 2_2_06F4F3C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 2_2_06F4F080
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 2_2_0A6E51C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 2_2_0A6EC9D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 2_2_0A6E9700
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 2_2_0A6EF7D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 2_2_0A6EB590
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 2_2_0A6E32A8
                Source: FqjWpTMVBm.exe, 00000001.00000002.377328903.0000000002EFE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDTsBTsBtRBqOtEoXvXxcmxLWqLx.exe4 vs FqjWpTMVBm.exe
                Source: FqjWpTMVBm.exe, 00000001.00000000.366808060.0000000000A02000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenameZZSSACVSDFDHDJJHDG335.exeL vs FqjWpTMVBm.exe
                Source: FqjWpTMVBm.exe, 00000001.00000002.376697949.0000000002E89000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameResourceAssembly.dllD vs FqjWpTMVBm.exe
                Source: FqjWpTMVBm.exe, 00000001.00000002.378242847.00000000048E2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDTsBTsBtRBqOtEoXvXxcmxLWqLx.exe4 vs FqjWpTMVBm.exe
                Source: FqjWpTMVBm.exe, 00000001.00000002.377522791.0000000004685000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameResourceAssembly.dllD vs FqjWpTMVBm.exe
                Source: FqjWpTMVBm.exeBinary or memory string: OriginalFilenameZZSSACVSDFDHDJJHDG335.exeL vs FqjWpTMVBm.exe
                Source: FqjWpTMVBm.exeStatic PE information: invalid certificate
                Source: FqjWpTMVBm.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: FqjWpTMVBm.exeVirustotal: Detection: 56%
                Source: FqjWpTMVBm.exeMetadefender: Detection: 34%
                Source: FqjWpTMVBm.exeReversingLabs: Detection: 53%
                Source: FqjWpTMVBm.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\FqjWpTMVBm.exe "C:\Users\user\Desktop\FqjWpTMVBm.exe"
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\FqjWpTMVBm.exe.logJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/1
                Source: FqjWpTMVBm.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: 2.2.cvtres.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 2.2.cvtres.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 2.0.cvtres.exe.400000.2.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 2.0.cvtres.exe.400000.2.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 2.0.cvtres.exe.400000.4.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 2.0.cvtres.exe.400000.4.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: FqjWpTMVBm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: FqjWpTMVBm.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: FqjWpTMVBm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: ZZSSACVSDFDHDJJHDG335.pdb source: FqjWpTMVBm.exe
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_0109646E push ebp; retf
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeCode function: 1_2_01096478 push ebp; retf
                Source: FqjWpTMVBm.exeStatic PE information: real checksum: 0x395ac should be: 0x3a6a6
                Source: initial sampleStatic PE information: section name: .text entropy: 7.818885892211126

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (15).png
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exe TID: 5576Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 3776Thread sleep time: -3689348814741908s >= -30000s
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe TID: 2060Thread sleep count: 9568 > 30
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWindow / User API: threadDelayed 9568
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeThread delayed: delay time: 922337203685477
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeThread delayed: delay time: 922337203685477
                Source: cvtres.exe, 00000002.00000002.636689520.000000000A370000.00000004.00000800.00020000.00000000.sdmp, cvtres.exe, 00000002.00000003.407748576.000000000A39E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll!
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeProcess token adjusted: Debug
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeCode function: 2_2_0A6EF100 LdrInitializeThunk,
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 402000
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 436000
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 438000
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 4ED2008
                Source: FqjWpTMVBm.exe, MJCKVKLUIOR/MJCKVKLUIOR.csReference to suspicious API methods: ('\\x13', 'GetProcAddress@kernel32'), ('\\x10', 'LoadLibraryA@kernel32')
                Source: 1.0.FqjWpTMVBm.exe.a00000.0.unpack, MJCKVKLUIOR/MJCKVKLUIOR.csReference to suspicious API methods: ('\\x13', 'GetProcAddress@kernel32'), ('\\x10', 'LoadLibraryA@kernel32')
                Source: 2.2.cvtres.exe.400000.0.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                Source: 2.0.cvtres.exe.400000.2.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                Source: 2.0.cvtres.exe.400000.4.unpack, A/E1.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000 protect: page execute and read and write
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeQueries volume information: C:\Users\user\Desktop\FqjWpTMVBm.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\FqjWpTMVBm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.FqjWpTMVBm.exe.4dcb7a8.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.FqjWpTMVBm.exe.4dcb7a8.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000000.373575216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.372648537.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.373105695.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.632455150.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.374189805.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.378242847.00000000048E2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.634341164.0000000006FB3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.634629489.0000000006FFE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FqjWpTMVBm.exe PID: 5068, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 2980, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: Yara matchFile source: 00000002.00000002.634341164.0000000006FB3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 2980, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.0.cvtres.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.cvtres.exe.400000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.cvtres.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.FqjWpTMVBm.exe.4dcb7a8.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.FqjWpTMVBm.exe.4dcb7a8.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.cvtres.exe.400000.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.cvtres.exe.400000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000000.373575216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.372648537.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.373105695.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.632455150.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.374189805.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.378242847.00000000048E2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.634341164.0000000006FB3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.634629489.0000000006FFE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: FqjWpTMVBm.exe PID: 5068, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: cvtres.exe PID: 2980, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                Path Interception311
                Process Injection
                11
                Masquerading
                1
                OS Credential Dumping
                111
                Security Software Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts1
                Native API
                Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Disable or Modify Tools
                1
                Input Capture
                1
                Process Discovery
                Remote Desktop Protocol1
                Input Capture
                Exfiltration Over Bluetooth1
                Non-Standard Port
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
                Virtualization/Sandbox Evasion
                Security Account Manager131
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares11
                Archive Collected Data
                Automated Exfiltration1
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)311
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object Model1
                Data from Local System
                Scheduled Transfer11
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                Remote System Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common2
                Obfuscated Files or Information
                Cached Domain Credentials114
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items3
                Software Packing
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                FqjWpTMVBm.exe56%VirustotalBrowse
                FqjWpTMVBm.exe34%MetadefenderBrowse
                FqjWpTMVBm.exe54%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                FqjWpTMVBm.exe100%AviraTR/AD.AgentTesla.tstiz
                FqjWpTMVBm.exe100%Joe Sandbox ML
                No Antivirus matches
                SourceDetectionScannerLabelLinkDownload
                2.2.cvtres.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                2.0.cvtres.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                2.0.cvtres.exe.400000.2.unpack100%AviraTR/Spy.Gen8Download File
                2.0.cvtres.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                2.0.cvtres.exe.400000.3.unpack100%AviraTR/Spy.Gen8Download File
                2.0.cvtres.exe.400000.1.unpack100%AviraTR/Spy.Gen8Download File
                SourceDetectionScannerLabelLink
                tycautomotriz.cl0%VirustotalBrowse
                mail.tycautomotriz.cl1%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://mail.tycautomotriz.cl0%Avira URL Cloudsafe
                http://VMDVyE.com0%Avira URL Cloudsafe
                https://api.ipify.org%%startupfolder%0%URL Reputationsafe
                https://api.ipify.org%0%URL Reputationsafe
                http://tycautomotriz.cl0%Avira URL Cloudsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                tycautomotriz.cl
                131.72.236.163
                truefalseunknown
                mail.tycautomotriz.cl
                unknown
                unknowntrueunknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://127.0.0.1:HTTP/1.1cvtres.exe, 00000002.00000002.634341164.0000000006FB3000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://mail.tycautomotriz.clcvtres.exe, 00000002.00000002.635170682.0000000007096000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://VMDVyE.comcvtres.exe, 00000002.00000002.634341164.0000000006FB3000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://api.ipify.org%%startupfolder%cvtres.exe, 00000002.00000002.634341164.0000000006FB3000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                low
                https://api.ipify.org%cvtres.exe, 00000002.00000002.634341164.0000000006FB3000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                low
                http://tycautomotriz.clcvtres.exe, 00000002.00000002.635170682.0000000007096000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwcvtres.exe, 00000002.00000002.634341164.0000000006FB3000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://DynDns.comDynDNSnamejidpasswordPsi/Psicvtres.exe, 00000002.00000002.634341164.0000000006FB3000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                131.72.236.163
                tycautomotriz.clChile
                263753GONZALEZULLOAJUANCARLOSCLfalse
                Joe Sandbox Version:35.0.0 Citrine
                Analysis ID:679161
                Start date and time: 05/08/202211:06:212022-08-05 11:06:21 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 8m 52s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:FqjWpTMVBm (renamed file extension from none to exe)
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:19
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@3/1@2/1
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:Failed
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                • Excluded IPs from analysis (whitelisted): 23.211.6.115
                • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                11:07:34API Interceptor1x Sleep call for process: FqjWpTMVBm.exe modified
                11:07:39API Interceptor757x Sleep call for process: cvtres.exe modified
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\Desktop\FqjWpTMVBm.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):226
                Entropy (8bit):5.3467126928258955
                Encrypted:false
                SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2LDY3U21v:Q3La/KDLI4MWuPk21v
                MD5:DD8B7A943A5D834CEEAB90A6BBBF4781
                SHA1:2BED8D47DF1C0FF76B40811E5F11298BD2D06389
                SHA-256:E1D0A304B16BE51AE361E392A678D887AB0B76630B42A12D252EDC0484F0333B
                SHA-512:24167174EA259CAF57F65B9B9B9C113DD944FC957DB444C2F66BC656EC2E6565EFE4B4354660A5BE85CE4847434B3BDD4F7E05A9E9D61F4CC99FF0284DAA1C87
                Malicious:true
                Reputation:moderate, very likely benign file
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):7.791868867879629
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                • Win32 Executable (generic) a (10002005/4) 49.97%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:FqjWpTMVBm.exe
                File size:227744
                MD5:f8b75a887b9774203f7d77de434f40ea
                SHA1:e19add1ef9b87ef54de6870b229cfbcaaeddb0fa
                SHA256:de373cb42386f956133546049fa24b0ec459a78c7e667c9d05c366c198b680b3
                SHA512:d147d34dfa0e4e2544dc1971e490e6242e3ec43410d6ce8e80edbaeb1c112dc2ebb586ff265e56f2f96b177fc538362d3d38ee6d98ea3a5297174fd3e05667b6
                SSDEEP:6144:9ozPrnXx5dQkZdis9lWV8TSGjF/A/iepoUPNzHnt4V:9OPLhldis9YV8mGjF/8RpVVzHnt4V
                TLSH:EB24CF8CB690749FC41BCA728AA45C20AB706676530BD203A473B2AC9D4D7DBCF15DF2
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L... .b..............0..6...........U... ...`....@.. ....................................`................................
                Icon Hash:4f050d0d0d054f90
                Entrypoint:0x4355ae
                Entrypoint Section:.text
                Digitally signed:true
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x62D92020 [Thu Jul 21 09:45:04 2022 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Signature Valid:false
                Signature Issuer:CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                Signature Validation Error:The digital signature of the object did not verify
                Error Number:-2146869232
                Not Before, Not After
                • 9/2/2021 11:33:02 AM 9/1/2022 11:33:02 AM
                Subject Chain
                • CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                Version:3
                Thumbprint MD5:550C27BE6F1184B6CC93B4B4E2EA9D58
                Thumbprint SHA-1:C9CAEDC2CECF953E812C6446D41927B9864BB880
                Thumbprint SHA-256:63E8D95BCEE4522E6380E7F9305A676C0880AD93AD3BA9CB53FE43D6081A1025
                Serial:3300000255181DA42EE086FC15000000000255
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x355600x4b.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x360000x176a.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x352000x27a0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x380000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x355100x1c.text
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x335b40x33600False0.8921361770072993data7.818885892211126IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x360000x176a0x1800False0.3414713541666667data5.485078903544396IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x380000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_ICON0x361480x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4294440951, next used block 4294440951
                RT_GROUP_ICON0x371f00x14data
                RT_VERSION0x372040x37cdata
                RT_MANIFEST0x375800x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                DLLImport
                mscoree.dll_CorExeMain
                TimestampSource PortDest PortSource IPDest IP
                Aug 5, 2022 11:07:46.565253973 CEST49767587192.168.2.6131.72.236.163
                Aug 5, 2022 11:07:46.793812990 CEST58749767131.72.236.163192.168.2.6
                Aug 5, 2022 11:07:46.794018030 CEST49767587192.168.2.6131.72.236.163
                Aug 5, 2022 11:07:47.626421928 CEST58749767131.72.236.163192.168.2.6
                Aug 5, 2022 11:07:47.627425909 CEST49767587192.168.2.6131.72.236.163
                Aug 5, 2022 11:07:47.855689049 CEST58749767131.72.236.163192.168.2.6
                Aug 5, 2022 11:07:47.906838894 CEST49767587192.168.2.6131.72.236.163
                Aug 5, 2022 11:07:48.135126114 CEST58749767131.72.236.163192.168.2.6
                Aug 5, 2022 11:07:48.135590076 CEST49767587192.168.2.6131.72.236.163
                Aug 5, 2022 11:07:48.403573990 CEST58749767131.72.236.163192.168.2.6
                Aug 5, 2022 11:07:50.377939939 CEST58749767131.72.236.163192.168.2.6
                Aug 5, 2022 11:07:50.619076967 CEST49767587192.168.2.6131.72.236.163
                Aug 5, 2022 11:07:51.005968094 CEST49767587192.168.2.6131.72.236.163
                Aug 5, 2022 11:07:51.234277964 CEST58749767131.72.236.163192.168.2.6
                Aug 5, 2022 11:07:51.234656096 CEST58749767131.72.236.163192.168.2.6
                Aug 5, 2022 11:07:51.235804081 CEST58749767131.72.236.163192.168.2.6
                Aug 5, 2022 11:07:51.235888958 CEST49767587192.168.2.6131.72.236.163
                Aug 5, 2022 11:07:51.333825111 CEST49767587192.168.2.6131.72.236.163
                Aug 5, 2022 11:07:51.561659098 CEST58749767131.72.236.163192.168.2.6
                TimestampSource PortDest PortSource IPDest IP
                Aug 5, 2022 11:07:46.036142111 CEST5872353192.168.2.68.8.8.8
                Aug 5, 2022 11:07:46.268486977 CEST53587238.8.8.8192.168.2.6
                Aug 5, 2022 11:07:46.309483051 CEST5197153192.168.2.68.8.8.8
                Aug 5, 2022 11:07:46.552295923 CEST53519718.8.8.8192.168.2.6
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Aug 5, 2022 11:07:46.036142111 CEST192.168.2.68.8.8.80xae4cStandard query (0)mail.tycautomotriz.clA (IP address)IN (0x0001)
                Aug 5, 2022 11:07:46.309483051 CEST192.168.2.68.8.8.80x4b5Standard query (0)mail.tycautomotriz.clA (IP address)IN (0x0001)
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Aug 5, 2022 11:07:46.268486977 CEST8.8.8.8192.168.2.60xae4cNo error (0)mail.tycautomotriz.cltycautomotriz.clCNAME (Canonical name)IN (0x0001)
                Aug 5, 2022 11:07:46.268486977 CEST8.8.8.8192.168.2.60xae4cNo error (0)tycautomotriz.cl131.72.236.163A (IP address)IN (0x0001)
                Aug 5, 2022 11:07:46.552295923 CEST8.8.8.8192.168.2.60x4b5No error (0)mail.tycautomotriz.cltycautomotriz.clCNAME (Canonical name)IN (0x0001)
                Aug 5, 2022 11:07:46.552295923 CEST8.8.8.8192.168.2.60x4b5No error (0)tycautomotriz.cl131.72.236.163A (IP address)IN (0x0001)
                TimestampSource PortDest PortSource IPDest IPCommands
                Aug 5, 2022 11:07:47.626421928 CEST58749767131.72.236.163192.168.2.6220-srv35.benzahosting.cl ESMTP Exim 4.95 #2 Fri, 05 Aug 2022 05:07:47 -0400
                220-We do not authorize the use of this system to transport unsolicited,
                220 and/or bulk e-mail.
                Aug 5, 2022 11:07:47.627425909 CEST49767587192.168.2.6131.72.236.163EHLO 506013
                Aug 5, 2022 11:07:47.855689049 CEST58749767131.72.236.163192.168.2.6250-srv35.benzahosting.cl Hello 506013 [102.129.143.3]
                250-SIZE 52428800
                250-8BITMIME
                250-PIPELINING
                250-PIPE_CONNECT
                250-AUTH PLAIN LOGIN
                250-STARTTLS
                250 HELP
                Aug 5, 2022 11:07:47.906838894 CEST49767587192.168.2.6131.72.236.163AUTH login Y29udGFjdG9AdHljYXV0b21vdHJpei5jbA==
                Aug 5, 2022 11:07:48.135126114 CEST58749767131.72.236.163192.168.2.6334 UGFzc3dvcmQ6
                Aug 5, 2022 11:07:50.377939939 CEST58749767131.72.236.163192.168.2.6535 Incorrect authentication data
                Aug 5, 2022 11:07:51.005968094 CEST49767587192.168.2.6131.72.236.163MAIL FROM:<contacto@tycautomotriz.cl>
                Aug 5, 2022 11:07:51.234656096 CEST58749767131.72.236.163192.168.2.6550 Access denied - Invalid HELO name (See RFC2821 4.1.1.1)

                Click to jump to process

                Target ID:1
                Start time:11:07:32
                Start date:05/08/2022
                Path:C:\Users\user\Desktop\FqjWpTMVBm.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\FqjWpTMVBm.exe"
                Imagebase:0xa00000
                File size:227744 bytes
                MD5 hash:F8B75A887B9774203F7D77DE434F40EA
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.378242847.00000000048E2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.378242847.00000000048E2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000001.00000002.378242847.00000000048E2000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                Reputation:low

                Target ID:2
                Start time:11:07:34
                Start date:05/08/2022
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                Imagebase:0x3a0000
                File size:43176 bytes
                MD5 hash:C09985AE74F0882F208D75DE27770DFA
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.373575216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.373575216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000002.00000000.373575216.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.372648537.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.372648537.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000002.00000000.372648537.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.634341164.0000000006FB3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.634341164.0000000006FB3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.373105695.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.373105695.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000002.00000000.373105695.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.632455150.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000002.632455150.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000002.00000002.632455150.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.634629489.0000000006FFE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.374189805.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000002.00000000.374189805.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000002.00000000.374189805.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                Reputation:moderate

                No disassembly