Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
offer_doc.exe

Overview

General Information

Sample Name:offer_doc.exe
Analysis ID:680343
MD5:915026107719604ff39f95cd37c6da08
SHA1:7708c1a71b95b019ff7d02e295938b342f2bdfb7
SHA256:f6d4110e70ad9d1525395ad0f693bb5132d7684c989bc2e6ab2e4b12a22223f0
Tags:agentteslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • offer_doc.exe (PID: 5428 cmdline: "C:\Users\user\Desktop\offer_doc.exe" MD5: 915026107719604FF39F95CD37C6DA08)
    • offer_doc.exe (PID: 4516 cmdline: C:\Users\user\Desktop\offer_doc.exe MD5: 915026107719604FF39F95CD37C6DA08)
  • cleanup
{"Exfil Mode": "SMTP", "Username": "info@rwan.asia", "Password": "RWAN802754", "Host": "mail.rwan.asia"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.446200384.0000000002CEF000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
        • 0x3009d:$a13: get_DnsResolver
        • 0x2e8b2:$a20: get_LastAccessed
        • 0x30a1b:$a27: set_InternalServerPort
        • 0x30d37:$a30: set_GuidMasterKey
        • 0x2e9b9:$a33: get_Clipboard
        • 0x2e9c7:$a34: get_Keyboard
        • 0x2fcd0:$a35: get_ShiftKeyDown
        • 0x2fce1:$a36: get_AltKeyDown
        • 0x2e9d4:$a37: get_Password
        • 0x2f480:$a38: get_PasswordHash
        • 0x3049d:$a39: get_DefaultCredentials
        00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_e577e17eunknownunknown
        • 0x8004:$a: 20 4D 27 00 00 33 DB 19 0B 00 07 17 FE 01 2C 02 18 0B 00 07
        Click to see the 13 entries
        SourceRuleDescriptionAuthorStrings
        0.2.offer_doc.exe.3bd37a8.7.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          0.2.offer_doc.exe.3bd37a8.7.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            0.2.offer_doc.exe.3bd37a8.7.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
            • 0x30d4f:$s10: logins
            • 0x307b6:$s11: credential
            • 0x2cdb9:$g1: get_Clipboard
            • 0x2cdc7:$g2: get_Keyboard
            • 0x2cdd4:$g3: get_Password
            • 0x2e0c0:$g4: get_CtrlKeyDown
            • 0x2e0d0:$g5: get_ShiftKeyDown
            • 0x2e0e1:$g6: get_AltKeyDown
            0.2.offer_doc.exe.3bd37a8.7.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
            • 0x2e49d:$a13: get_DnsResolver
            • 0x2ccb2:$a20: get_LastAccessed
            • 0x2ee1b:$a27: set_InternalServerPort
            • 0x2f137:$a30: set_GuidMasterKey
            • 0x2cdb9:$a33: get_Clipboard
            • 0x2cdc7:$a34: get_Keyboard
            • 0x2e0d0:$a35: get_ShiftKeyDown
            • 0x2e0e1:$a36: get_AltKeyDown
            • 0x2cdd4:$a37: get_Password
            • 0x2d880:$a38: get_PasswordHash
            • 0x2e89d:$a39: get_DefaultCredentials
            0.2.offer_doc.exe.3bd37a8.7.unpackWindows_Trojan_AgentTesla_e577e17eunknownunknown
            • 0x6404:$a: 20 4D 27 00 00 33 DB 19 0B 00 07 17 FE 01 2C 02 18 0B 00 07
            Click to see the 28 entries
            No Sigma rule has matched
            Timestamp:192.168.2.5119.59.104.27497195872030171 08/08/22-12:37:22.771751
            SID:2030171
            Source Port:49719
            Destination Port:587
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.5119.59.104.27497195872840032 08/08/22-12:37:22.771866
            SID:2840032
            Source Port:49719
            Destination Port:587
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.5119.59.104.27497195872851779 08/08/22-12:37:22.771866
            SID:2851779
            Source Port:49719
            Destination Port:587
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: offer_doc.exeReversingLabs: Detection: 24%
            Source: offer_doc.exeJoe Sandbox ML: detected
            Source: 3.0.offer_doc.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
            Source: 3.0.offer_doc.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "info@rwan.asia", "Password": "RWAN802754", "Host": "mail.rwan.asia"}
            Source: offer_doc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: offer_doc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.5:49719 -> 119.59.104.27:587
            Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.5:49719 -> 119.59.104.27:587
            Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.5:49719 -> 119.59.104.27:587
            Source: Joe Sandbox ViewASN Name: METRABYTE-TH453LadplacoutJorakhaebuaTH METRABYTE-TH453LadplacoutJorakhaebuaTH
            Source: global trafficTCP traffic: 192.168.2.5:49719 -> 119.59.104.27:587
            Source: global trafficTCP traffic: 192.168.2.5:49719 -> 119.59.104.27:587
            Source: offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
            Source: offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://dzByIm.com
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
            Source: offer_doc.exe, 00000003.00000002.678536332.00000000030EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.rwan.asia
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: offer_doc.exe, 00000000.00000002.434864485.0000000001097000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.como
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%
            Source: offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%%startupfolder%
            Source: offer_doc.exe, 00000003.00000002.678536332.00000000030EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://hI6edvnAmdv.org
            Source: offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
            Source: unknownDNS traffic detected: queries for: mail.rwan.asia
            Source: offer_doc.exe, 00000000.00000002.433866824.0000000000C0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

            System Summary

            barindex
            Source: 0.2.offer_doc.exe.3bd37a8.7.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: 0.2.offer_doc.exe.3bd37a8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 0.2.offer_doc.exe.3bd37a8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e Author: unknown
            Source: 3.0.offer_doc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: 3.0.offer_doc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 3.0.offer_doc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e Author: unknown
            Source: 0.2.offer_doc.exe.3b9f188.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: 0.2.offer_doc.exe.3b9f188.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 0.2.offer_doc.exe.3b9f188.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e Author: unknown
            Source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e Author: unknown
            Source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e Author: unknown
            Source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
            Source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e Author: unknown
            Source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_e577e17e Author: unknown
            Source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_e577e17e Author: unknown
            Source: Process Memory Space: offer_doc.exe PID: 5428, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: Process Memory Space: offer_doc.exe PID: 4516, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
            Source: initial sampleStatic PE information: Filename: offer_doc.exe
            Source: 3.0.offer_doc.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bBFEAAEE6u002d466Du002d4D0Au002d8579u002d0D52F9710340u007d/u0038E7E1D9Bu002d4103u002d4A26u002d9CEAu002d5E7F2E73DD6F.csLarge array initialization: .cctor: array initializer size 11630
            Source: offer_doc.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.offer_doc.exe.3bd37a8.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: 0.2.offer_doc.exe.3bd37a8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 0.2.offer_doc.exe.3bd37a8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 009cb27295a1aa0dde84d29ee49b8fa2e7a6cec75eccb7534fec3f5c89395a9d, id = e577e17e-5c42-4431-8c2d-0c1153128226, last_modified = 2022-04-12
            Source: 3.0.offer_doc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: 3.0.offer_doc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 3.0.offer_doc.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 009cb27295a1aa0dde84d29ee49b8fa2e7a6cec75eccb7534fec3f5c89395a9d, id = e577e17e-5c42-4431-8c2d-0c1153128226, last_modified = 2022-04-12
            Source: 0.2.offer_doc.exe.3b9f188.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: 0.2.offer_doc.exe.3b9f188.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 0.2.offer_doc.exe.3b9f188.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 009cb27295a1aa0dde84d29ee49b8fa2e7a6cec75eccb7534fec3f5c89395a9d, id = e577e17e-5c42-4431-8c2d-0c1153128226, last_modified = 2022-04-12
            Source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 009cb27295a1aa0dde84d29ee49b8fa2e7a6cec75eccb7534fec3f5c89395a9d, id = e577e17e-5c42-4431-8c2d-0c1153128226, last_modified = 2022-04-12
            Source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 009cb27295a1aa0dde84d29ee49b8fa2e7a6cec75eccb7534fec3f5c89395a9d, id = e577e17e-5c42-4431-8c2d-0c1153128226, last_modified = 2022-04-12
            Source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
            Source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_e577e17e reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 009cb27295a1aa0dde84d29ee49b8fa2e7a6cec75eccb7534fec3f5c89395a9d, id = e577e17e-5c42-4431-8c2d-0c1153128226, last_modified = 2022-04-12
            Source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_e577e17e reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 009cb27295a1aa0dde84d29ee49b8fa2e7a6cec75eccb7534fec3f5c89395a9d, id = e577e17e-5c42-4431-8c2d-0c1153128226, last_modified = 2022-04-12
            Source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_e577e17e reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 009cb27295a1aa0dde84d29ee49b8fa2e7a6cec75eccb7534fec3f5c89395a9d, id = e577e17e-5c42-4431-8c2d-0c1153128226, last_modified = 2022-04-12
            Source: Process Memory Space: offer_doc.exe PID: 5428, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: Process Memory Space: offer_doc.exe PID: 4516, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_00BFCD04
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_00BFF0D0
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_06ED41D0
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_06ED4F28
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_07105DC8
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_07105590
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_071055A0
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_07106F9A
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 0_2_07106FA8
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0140F080
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_01406120
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0140F3C8
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637BFB8
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06378440
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637C0C4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063776A8
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063732A8
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066AA278
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066AAA88
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066A8740
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066AF338
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066A7BC8
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066ABB80
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066A38C0
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066A28D0
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066ABB1C
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066AA939
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066A8930
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066FADE8
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066F1AC4
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066F4B10
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637A7E8
            Source: offer_doc.exe, 00000000.00000002.438858978.0000000002B0B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000002.452768106.0000000006EB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000002.433866824.0000000000C0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000002.453065620.0000000006F00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000003.423409650.0000000000C95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000002.453449981.0000000007070000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000000.407180408.00000000005EE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSYSTEMI.exeB vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQIPpUdJOXlzKKWqWQXrayNItXcNYucwtbWIvIC.exe4 vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs offer_doc.exe
            Source: offer_doc.exe, 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQIPpUdJOXlzKKWqWQXrayNItXcNYucwtbWIvIC.exe4 vs offer_doc.exe
            Source: offer_doc.exe, 00000003.00000000.431756265.0000000000436000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameQIPpUdJOXlzKKWqWQXrayNItXcNYucwtbWIvIC.exe4 vs offer_doc.exe
            Source: offer_doc.exe, 00000003.00000002.673994817.0000000000BE8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs offer_doc.exe
            Source: offer_doc.exe, 00000003.00000002.674351176.000000000101A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs offer_doc.exe
            Source: offer_doc.exeBinary or memory string: OriginalFilenameSYSTEMI.exeB vs offer_doc.exe
            Source: offer_doc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: offer_doc.exeReversingLabs: Detection: 24%
            Source: offer_doc.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\offer_doc.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\offer_doc.exe "C:\Users\user\Desktop\offer_doc.exe"
            Source: C:\Users\user\Desktop\offer_doc.exeProcess created: C:\Users\user\Desktop\offer_doc.exe C:\Users\user\Desktop\offer_doc.exe
            Source: C:\Users\user\Desktop\offer_doc.exeProcess created: C:\Users\user\Desktop\offer_doc.exe C:\Users\user\Desktop\offer_doc.exe
            Source: C:\Users\user\Desktop\offer_doc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
            Source: C:\Users\user\Desktop\offer_doc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\offer_doc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\offer_doc.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\offer_doc.exe.logJump to behavior
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
            Source: offer_doc.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\offer_doc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\offer_doc.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: offer_doc.exe, ProcExpGUI/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 0.0.offer_doc.exe.520000.0.unpack, ProcExpGUI/Form1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 3.0.offer_doc.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: 3.0.offer_doc.exe.400000.0.unpack, A/F1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
            Source: C:\Users\user\Desktop\offer_doc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\offer_doc.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: C:\Users\user\Desktop\offer_doc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: offer_doc.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: offer_doc.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: offer_doc.exe, ProcExpGUI/Form1.cs.Net Code: WaitHandle System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 0.0.offer_doc.exe.520000.0.unpack, ProcExpGUI/Form1.cs.Net Code: WaitHandle System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716B2 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716BA push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716A9 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637169E push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637169A push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637168E push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716F1 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716FA push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716E2 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716EA push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716D2 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716D9 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716C1 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063716CA push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371732 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371739 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371721 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637172A push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371712 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637171A push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371702 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371709 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371752 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371742 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_0637174A push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063717B2 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063717B9 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063717A1 push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063717AE push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_063717AA push es; ret
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_06371796 push es; ret
            Source: initial sampleStatic PE information: section name: .text entropy: 7.788970576048009
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: 00000000.00000002.446200384.0000000002CEF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: offer_doc.exe PID: 5428, type: MEMORYSTR
            Source: offer_doc.exe, 00000000.00000002.446200384.0000000002CEF000.00000004.00000800.00020000.00000000.sdmp, offer_doc.exe, 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: offer_doc.exe, 00000000.00000002.446200384.0000000002CEF000.00000004.00000800.00020000.00000000.sdmp, offer_doc.exe, 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Source: C:\Users\user\Desktop\offer_doc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\offer_doc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\offer_doc.exe TID: 5440Thread sleep time: -45877s >= -30000s
            Source: C:\Users\user\Desktop\offer_doc.exe TID: 3108Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\offer_doc.exe TID: 3676Thread sleep count: 9610 > 30
            Source: C:\Users\user\Desktop\offer_doc.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\offer_doc.exeWindow / User API: threadDelayed 9610
            Source: C:\Users\user\Desktop\offer_doc.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\offer_doc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\offer_doc.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\offer_doc.exeThread delayed: delay time: 45877
            Source: C:\Users\user\Desktop\offer_doc.exeThread delayed: delay time: 922337203685477
            Source: offer_doc.exe, 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: offer_doc.exe, 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: offer_doc.exe, 00000003.00000003.473613333.00000000010B9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll'
            Source: offer_doc.exe, 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
            Source: offer_doc.exe, 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
            Source: C:\Users\user\Desktop\offer_doc.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\offer_doc.exeCode function: 3_2_066AB210 LdrInitializeThunk,
            Source: C:\Users\user\Desktop\offer_doc.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\offer_doc.exeMemory written: C:\Users\user\Desktop\offer_doc.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\offer_doc.exeProcess created: C:\Users\user\Desktop\offer_doc.exe C:\Users\user\Desktop\offer_doc.exe
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Users\user\Desktop\offer_doc.exe VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Users\user\Desktop\offer_doc.exe VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\offer_doc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.offer_doc.exe.3bd37a8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.offer_doc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.offer_doc.exe.3b9f188.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: offer_doc.exe PID: 5428, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: offer_doc.exe PID: 4516, type: MEMORYSTR
            Source: C:\Users\user\Desktop\offer_doc.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Users\user\Desktop\offer_doc.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Users\user\Desktop\offer_doc.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Users\user\Desktop\offer_doc.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
            Source: C:\Users\user\Desktop\offer_doc.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
            Source: C:\Users\user\Desktop\offer_doc.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
            Source: C:\Users\user\Desktop\offer_doc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: C:\Users\user\Desktop\offer_doc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
            Source: Yara matchFile source: 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: offer_doc.exe PID: 4516, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.offer_doc.exe.3bd37a8.7.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.offer_doc.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.offer_doc.exe.3b9f188.6.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.offer_doc.exe.3bd37a8.7.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.offer_doc.exe.3b9f188.6.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.offer_doc.exe.3b68d68.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: offer_doc.exe PID: 5428, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: offer_doc.exe PID: 4516, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts211
            Windows Management Instrumentation
            Path Interception111
            Process Injection
            1
            Masquerading
            2
            OS Credential Dumping
            211
            Security Software Discovery
            Remote Services1
            Email Collection
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            1
            Input Capture
            1
            Process Discovery
            Remote Desktop Protocol1
            Input Capture
            Exfiltration Over Bluetooth1
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
            Virtualization/Sandbox Evasion
            1
            Credentials in Registry
            131
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares11
            Archive Collected Data
            Automated Exfiltration1
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object Model2
            Data from Local System
            Scheduled Transfer11
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Remote System Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common2
            Obfuscated Files or Information
            Cached Domain Credentials114
            System Information Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items13
            Software Packing
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            offer_doc.exe24%ReversingLabsByteCode-MSIL.Trojan.Pwsx
            offer_doc.exe100%Joe Sandbox ML
            No Antivirus matches
            SourceDetectionScannerLabelLinkDownload
            3.0.offer_doc.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            https://api.ipify.org%%startupfolder%0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://mail.rwan.asia0%Avira URL Cloudsafe
            http://dzByIm.com0%Avira URL Cloudsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
            http://www.fontbureau.como0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            https://api.ipify.org%0%URL Reputationsafe
            https://hI6edvnAmdv.org0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            mail.rwan.asia
            119.59.104.27
            truetrue
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://127.0.0.1:HTTP/1.1offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://www.apache.org/licenses/LICENSE-2.0offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designersGoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designers/?offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/bTheoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers?offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwoffer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.tiro.comoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designersoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://api.ipify.org%%startupfolder%offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          low
                          http://www.goodfont.co.kroffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://mail.rwan.asiaoffer_doc.exe, 00000003.00000002.678536332.00000000030EA000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://dzByIm.comoffer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.carterandcone.comloffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sajatypeworks.comoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.typography.netDoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmlNoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/cTheoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.comoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cnoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/frere-jones.htmloffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.jiyu-kobo.co.jp/offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://DynDns.comDynDNSnamejidpasswordPsi/Psioffer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.comooffer_doc.exe, 00000000.00000002.434864485.0000000001097000.00000004.00000020.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/DPleaseoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers8offer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fonts.comoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.sandoll.co.kroffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.urwpp.deDPleaseoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.zhongyicts.com.cnoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sakkal.comoffer_doc.exe, 00000000.00000002.450816491.00000000069D2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://api.ipify.org%offer_doc.exe, 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  low
                                  https://hI6edvnAmdv.orgoffer_doc.exe, 00000003.00000002.678536332.00000000030EA000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  119.59.104.27
                                  mail.rwan.asiaThailand
                                  56067METRABYTE-TH453LadplacoutJorakhaebuaTHtrue
                                  Joe Sandbox Version:35.0.0 Citrine
                                  Analysis ID:680343
                                  Start date and time: 08/08/202212:35:502022-08-08 12:35:50 +02:00
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 7m 25s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:offer_doc.exe
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:18
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HDC Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 98%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Adjust boot time
                                  • Enable AMSI
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, HxTsr.exe, RuntimeBroker.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                  • Excluded domains from analysis (whitelisted): www.bing.com, licensing.mp.microsoft.com, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, storeedgefd.dsx.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  12:37:00API Interceptor759x Sleep call for process: offer_doc.exe modified
                                  No context
                                  No context
                                  No context
                                  No context
                                  No context
                                  Process:C:\Users\user\Desktop\offer_doc.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1308
                                  Entropy (8bit):5.345811588615766
                                  Encrypted:false
                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                  MD5:2E016B886BDB8389D2DD0867BE55F87B
                                  SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                  SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                  SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                  Malicious:true
                                  Reputation:high, very likely benign file
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.782708595845613
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:offer_doc.exe
                                  File size:833536
                                  MD5:915026107719604ff39f95cd37c6da08
                                  SHA1:7708c1a71b95b019ff7d02e295938b342f2bdfb7
                                  SHA256:f6d4110e70ad9d1525395ad0f693bb5132d7684c989bc2e6ab2e4b12a22223f0
                                  SHA512:96a6c907bf2de1eb5e72c702a91a541b1d34f2ea176fc669f103ad7c80ea1d3e534632a5262215251d077c111f50dcd3d1828c58973ce598c6d22628d9d167f3
                                  SSDEEP:24576:NBZFxgV10k+YG7Cbgu8KPVeCwZOe9IbUDHDl:1gVWCFzDPVeCwc7U
                                  TLSH:2E05BF1BBF147308C5A76AB5EE0BBD6267F61C5D3135E0783A647C4A4AFF301E52242A
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b..............0.................. ........@.. ....................... ............@................................
                                  Icon Hash:00828e8e8686b000
                                  Entrypoint:0x4cceaa
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x62F0B69A [Mon Aug 8 07:09:14 2022 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xcce580x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xce0000x390.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xd00000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000xcaeb00xcb000False0.8195620381773399PGP symmetric key encrypted data - Plaintext or unencrypted data7.788970576048009IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0xce0000x3900x400False0.3740234375data2.8957942416950724IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0xd00000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountry
                                  RT_VERSION0xce0580x334data
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  192.168.2.5119.59.104.27497195872030171 08/08/22-12:37:22.771751TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49719587192.168.2.5119.59.104.27
                                  192.168.2.5119.59.104.27497195872840032 08/08/22-12:37:22.771866TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249719587192.168.2.5119.59.104.27
                                  192.168.2.5119.59.104.27497195872851779 08/08/22-12:37:22.771866TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49719587192.168.2.5119.59.104.27
                                  TimestampSource PortDest PortSource IPDest IP
                                  Aug 8, 2022 12:37:20.559009075 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:20.761368036 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:20.761497974 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:21.500310898 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:21.510185957 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:21.747618914 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:21.749319077 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:21.951539040 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:21.952100992 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:22.158607006 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:22.164627075 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:22.366159916 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:22.366766930 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:22.569576025 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:22.570023060 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:22.770673990 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:22.770766020 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:22.771750927 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:22.771866083 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:22.772742987 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:22.772816896 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:37:22.973253965 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:22.973604918 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:23.125147104 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:37:23.167823076 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:39:00.131582975 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:39:00.333028078 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:39:00.333506107 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:39:00.334780931 CEST49719587192.168.2.5119.59.104.27
                                  Aug 8, 2022 12:39:00.535305977 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:39:00.536053896 CEST58749719119.59.104.27192.168.2.5
                                  Aug 8, 2022 12:39:00.536117077 CEST49719587192.168.2.5119.59.104.27
                                  TimestampSource PortDest PortSource IPDest IP
                                  Aug 8, 2022 12:37:20.161004066 CEST5176953192.168.2.58.8.8.8
                                  Aug 8, 2022 12:37:20.532987118 CEST53517698.8.8.8192.168.2.5
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                  Aug 8, 2022 12:37:20.161004066 CEST192.168.2.58.8.8.80x3028Standard query (0)mail.rwan.asiaA (IP address)IN (0x0001)
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                  Aug 8, 2022 12:37:20.532987118 CEST8.8.8.8192.168.2.50x3028No error (0)mail.rwan.asia119.59.104.27A (IP address)IN (0x0001)
                                  TimestampSource PortDest PortSource IPDest IPCommands
                                  Aug 8, 2022 12:37:21.500310898 CEST58749719119.59.104.27192.168.2.5220 ns61.hostinglotus.net ESMTP Exim 4.94.2 Mon, 08 Aug 2022 17:30:23 +0700
                                  Aug 8, 2022 12:37:21.510185957 CEST49719587192.168.2.5119.59.104.27EHLO 724536
                                  Aug 8, 2022 12:37:21.747618914 CEST58749719119.59.104.27192.168.2.5250-ns61.hostinglotus.net Hello 724536 [102.129.143.3]
                                  250-SIZE 52428800
                                  250-8BITMIME
                                  250-PIPELINING
                                  250-PIPE_CONNECT
                                  250-AUTH PLAIN LOGIN
                                  250-STARTTLS
                                  250 HELP
                                  Aug 8, 2022 12:37:21.749319077 CEST49719587192.168.2.5119.59.104.27AUTH login aW5mb0Byd2FuLmFzaWE=
                                  Aug 8, 2022 12:37:21.951539040 CEST58749719119.59.104.27192.168.2.5334 UGFzc3dvcmQ6
                                  Aug 8, 2022 12:37:22.158607006 CEST58749719119.59.104.27192.168.2.5235 Authentication succeeded
                                  Aug 8, 2022 12:37:22.164627075 CEST49719587192.168.2.5119.59.104.27MAIL FROM:<info@rwan.asia>
                                  Aug 8, 2022 12:37:22.366159916 CEST58749719119.59.104.27192.168.2.5250 OK
                                  Aug 8, 2022 12:37:22.366766930 CEST49719587192.168.2.5119.59.104.27RCPT TO:<africawire2018@gmail.com>
                                  Aug 8, 2022 12:37:22.569576025 CEST58749719119.59.104.27192.168.2.5250 Accepted
                                  Aug 8, 2022 12:37:22.570023060 CEST49719587192.168.2.5119.59.104.27DATA
                                  Aug 8, 2022 12:37:22.770766020 CEST58749719119.59.104.27192.168.2.5354 Enter message, ending with "." on a line by itself
                                  Aug 8, 2022 12:37:22.772816896 CEST49719587192.168.2.5119.59.104.27.
                                  Aug 8, 2022 12:37:23.125147104 CEST58749719119.59.104.27192.168.2.5250 OK id=1oL01g-00Ephe-V7
                                  Aug 8, 2022 12:39:00.131582975 CEST49719587192.168.2.5119.59.104.27QUIT
                                  Aug 8, 2022 12:39:00.333028078 CEST58749719119.59.104.27192.168.2.5221 ns61.hostinglotus.net closing connection

                                  Click to jump to process

                                  Target ID:0
                                  Start time:12:36:51
                                  Start date:08/08/2022
                                  Path:C:\Users\user\Desktop\offer_doc.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\offer_doc.exe"
                                  Imagebase:0x520000
                                  File size:833536 bytes
                                  MD5 hash:915026107719604FF39F95CD37C6DA08
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.446200384.0000000002CEF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.435893996.0000000002AA3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_AgentTesla_e577e17e, Description: unknown, Source: 00000000.00000002.447303398.0000000003B68000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  Reputation:low

                                  Target ID:3
                                  Start time:12:37:02
                                  Start date:08/08/2022
                                  Path:C:\Users\user\Desktop\offer_doc.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\Desktop\offer_doc.exe
                                  Imagebase:0x980000
                                  File size:833536 bytes
                                  MD5 hash:915026107719604FF39F95CD37C6DA08
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_AgentTesla_e577e17e, Description: unknown, Source: 00000003.00000000.431207200.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.676265825.0000000002D91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low

                                  No disassembly