Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Technical information zip.exe

Overview

General Information

Sample Name:Technical information zip.exe
Analysis ID:680483
MD5:ca033c84f5a37105d613c6961b724e97
SHA1:23f023abfef70de9ee2c909fbef985254b2abe26
SHA256:bfcb8ee096a65d7ec9201b67df585a7e715aaaa0aa2dcfec2e6ff208b3559498
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Snort IDS alert for network traffic
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains very large array initializations
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cleanup
{"Exfil Mode": "SMTP", "Username": "sales@cabletraychina.com", "Password": "Jhdq2017#", "Host": "mail.cabletraychina.com"}
SourceRuleDescriptionAuthorStrings
Technical information zip.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.305256005.000000000445B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.305256005.000000000445B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        00000000.00000002.305256005.000000000445B000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
        • 0x69c26:$a3: MailAccountConfiguration
        • 0x9fe46:$a3: MailAccountConfiguration
        • 0xd5e66:$a3: MailAccountConfiguration
        • 0x69c3f:$a5: SmtpAccountConfiguration
        • 0x9fe5f:$a5: SmtpAccountConfiguration
        • 0xd5e7f:$a5: SmtpAccountConfiguration
        • 0x69c06:$a8: set_BindingAccountConfiguration
        • 0x9fe26:$a8: set_BindingAccountConfiguration
        • 0xd5e46:$a8: set_BindingAccountConfiguration
        • 0x68b66:$a11: get_securityProfile
        • 0x9ed86:$a11: get_securityProfile
        • 0xd4da6:$a11: get_securityProfile
        • 0x68a07:$a12: get_useSeparateFolderTree
        • 0x9ec27:$a12: get_useSeparateFolderTree
        • 0xd4c47:$a12: get_useSeparateFolderTree
        • 0x6a369:$a13: get_DnsResolver
        • 0xa0589:$a13: get_DnsResolver
        • 0xd65a9:$a13: get_DnsResolver
        • 0x68e16:$a14: get_archivingScope
        • 0x9f036:$a14: get_archivingScope
        • 0xd5056:$a14: get_archivingScope
        00000006.00000000.293840755.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000006.00000000.293840755.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
            Click to see the 13 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Technical information zip.exe.4493998.7.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.Technical information zip.exe.4493998.7.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.Technical information zip.exe.4493998.7.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x2ef49:$s1: get_kbok
                • 0x2f87d:$s2: get_CHoo
                • 0x304d8:$s3: set_passwordIsSet
                • 0x2ed4d:$s4: get_enableLog
                • 0x333f7:$s8: torbrowser
                • 0x31dd3:$s10: logins
                • 0x3174b:$s11: credential
                • 0x2e133:$g1: get_Clipboard
                • 0x2e141:$g2: get_Keyboard
                • 0x2e14e:$g3: get_Password
                • 0x2f72b:$g4: get_CtrlKeyDown
                • 0x2f73b:$g5: get_ShiftKeyDown
                • 0x2f74c:$g6: get_AltKeyDown
                0.2.Technical information zip.exe.4493998.7.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
                • 0x2f48e:$a3: MailAccountConfiguration
                • 0x2f4a7:$a5: SmtpAccountConfiguration
                • 0x2f46e:$a8: set_BindingAccountConfiguration
                • 0x2e3ce:$a11: get_securityProfile
                • 0x2e26f:$a12: get_useSeparateFolderTree
                • 0x2fbd1:$a13: get_DnsResolver
                • 0x2e67e:$a14: get_archivingScope
                • 0x2e4a6:$a15: get_providerName
                • 0x30bbc:$a17: get_priority
                • 0x30190:$a18: get_advancedParameters
                • 0x2f5a8:$a19: get_disabledByRestriction
                • 0x2e045:$a20: get_LastAccessed
                • 0x2e718:$a21: get_avatarType
                • 0x302a7:$a22: get_signaturePresets
                • 0x2ed4d:$a23: get_enableLog
                • 0x2e523:$a26: set_accountName
                • 0x306f2:$a27: set_InternalServerPort
                • 0x2d984:$a28: set_bindingConfigurationUID
                • 0x3026d:$a29: set_IdnAddress
                • 0x30a70:$a30: set_GuidMasterKey
                • 0x2e57e:$a31: set_username
                0.2.Technical information zip.exe.44c9bb8.8.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  Click to see the 27 entries
                  No Sigma rule has matched
                  Timestamp:192.168.2.4162.215.255.143497805872840032 08/08/22-17:23:56.548969
                  SID:2840032
                  Source Port:49780
                  Destination Port:587
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.4162.215.255.143497805872839723 08/08/22-17:23:56.548892
                  SID:2839723
                  Source Port:49780
                  Destination Port:587
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.4162.215.255.143497805872851779 08/08/22-17:23:56.548969
                  SID:2851779
                  Source Port:49780
                  Destination Port:587
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.4162.215.255.143497805872030171 08/08/22-17:23:56.548892
                  SID:2030171
                  Source Port:49780
                  Destination Port:587
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results
                  Source: 6.0.Technical information zip.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: 6.0.Technical information zip.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "sales@cabletraychina.com", "Password": "Jhdq2017#", "Host": "mail.cabletraychina.com"}
                  Source: Technical information zip.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Technical information zip.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Networking

                  barindex
                  Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49780 -> 162.215.255.143:587
                  Source: TrafficSnort IDS: 2840032 ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 192.168.2.4:49780 -> 162.215.255.143:587
                  Source: TrafficSnort IDS: 2030171 ET TROJAN AgentTesla Exfil Via SMTP 192.168.2.4:49780 -> 162.215.255.143:587
                  Source: TrafficSnort IDS: 2839723 ETPRO TROJAN Win32/Agent Tesla SMTP Activity 192.168.2.4:49780 -> 162.215.255.143:587
                  Source: Yara matchFile source: Technical information zip.exe, type: SAMPLE
                  Source: Yara matchFile source: 6.0.Technical information zip.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.0.Technical information zip.exe.ee0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Technical information zip.exe.44c9bb8.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Technical information zip.exe.445b978.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Technical information zip.exe.4493998.7.raw.unpack, type: UNPACKEDPE
                  Source: Technical information zip.exe, 00000006.00000002.527868401.0000000003301000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                  Source: Technical information zip.exe, 00000006.00000002.527868401.0000000003301000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
                  Source: Technical information zip.exe, 00000006.00000002.527868401.0000000003301000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://YXbeSX.com
                  Source: Technical information zip.exeString found in binary or memory: http://boards.4chan.org/b/
                  Source: Technical information zip.exeString found in binary or memory: http://boards.4chan.org3Retrieving
                  Source: Technical information zip.exe, 00000006.00000002.534958591.0000000003659000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cabletraychina.com
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: Technical information zip.exeString found in binary or memory: http://images.4chan.org/
                  Source: Technical information zip.exe, 00000006.00000002.534958591.0000000003659000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.cabletraychina.com
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: Technical information zip.exe, 00000006.00000002.535012857.0000000003661000.00000004.00000800.00020000.00000000.sdmp, Technical information zip.exe, 00000006.00000002.534899990.000000000364F000.00000004.00000800.00020000.00000000.sdmp, Technical information zip.exe, 00000006.00000002.534929052.0000000003653000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://GQ0wtPGdRTxOSCfi6tDx.net
                  Source: Technical information zip.exe, 00000000.00000002.305256005.000000000445B000.00000004.00000800.00020000.00000000.sdmp, Technical information zip.exe, 00000006.00000000.293840755.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                  Source: Technical information zip.exe, 00000006.00000002.527868401.0000000003301000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                  Source: unknownDNS traffic detected: queries for: mail.cabletraychina.com
                  Source: Technical information zip.exe, 00000000.00000002.298204334.0000000001748000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                  System Summary

                  barindex
                  Source: 0.2.Technical information zip.exe.4493998.7.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.Technical information zip.exe.4493998.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.Technical information zip.exe.44c9bb8.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.Technical information zip.exe.44c9bb8.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 6.0.Technical information zip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 6.0.Technical information zip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.Technical information zip.exe.44c9bb8.8.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.Technical information zip.exe.44c9bb8.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 0.2.Technical information zip.exe.44c9bb8.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.Technical information zip.exe.445b978.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.Technical information zip.exe.445b978.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 0.2.Technical information zip.exe.445b978.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 0.2.Technical information zip.exe.4493998.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: 0.2.Technical information zip.exe.4493998.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                  Source: 0.2.Technical information zip.exe.4493998.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 00000000.00000002.305256005.000000000445B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 00000006.00000000.293840755.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 00000006.00000002.527868401.0000000003301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: Process Memory Space: Technical information zip.exe PID: 4828, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: Process Memory Space: Technical information zip.exe PID: 6128, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                  Source: Process Memory Space: Technical information zip.exe PID: 6128, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                  Source: 6.0.Technical information zip.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bAD45BFCAu002dFFC7u002d4A3Bu002dA103u002d50B83C31D5E4u007d/u00329B1881Bu002d2231u002d45D6u002dAF5Du002d402FCB22D10F.csLarge array initialization: .cctor: array initializer size 11940
                  Source: Technical information zip.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0.2.Technical information zip.exe.4493998.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.Technical information zip.exe.4493998.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.Technical information zip.exe.44c9bb8.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.Technical information zip.exe.44c9bb8.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 6.0.Technical information zip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 6.0.Technical information zip.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.Technical information zip.exe.44c9bb8.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.Technical information zip.exe.44c9bb8.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 0.2.Technical information zip.exe.44c9bb8.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.Technical information zip.exe.445b978.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.Technical information zip.exe.445b978.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 0.2.Technical information zip.exe.445b978.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 0.2.Technical information zip.exe.4493998.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: 0.2.Technical information zip.exe.4493998.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                  Source: 0.2.Technical information zip.exe.4493998.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 00000000.00000002.305256005.000000000445B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 00000006.00000000.293840755.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: 00000006.00000002.527868401.0000000003301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: Process Memory Space: Technical information zip.exe PID: 4828, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: Process Memory Space: Technical information zip.exe PID: 6128, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                  Source: Process Memory Space: Technical information zip.exe PID: 6128, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                  Source: C:\Users\user\Desktop\Technical information zip.exeCode function: 0_2_05793DC40_2_05793DC4
                  Source: C:\Users\user\Desktop\Technical information zip.exeCode function: 0_2_057984580_2_05798458
                  Source: C:\Users\user\Desktop\Technical information zip.exeCode function: 6_2_031246A06_2_031246A0
                  Source: C:\Users\user\Desktop\Technical information zip.exeCode function: 6_2_031246906_2_03124690
                  Source: C:\Users\user\Desktop\Technical information zip.exeCode function: 6_2_0312DA006_2_0312DA00
                  Source: Technical information zip.exe, 00000000.00000002.311102033.0000000007A80000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs Technical information zip.exe
                  Source: Technical information zip.exe, 00000000.00000003.276120039.00000000078E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKeysNormalize.dll4 vs Technical information zip.exe
                  Source: Technical information zip.exe, 00000000.00000002.305256005.000000000445B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamezznbyWxpDWxUCOhKNmqQnkhPaGcZHEXDqEsKkZ.exe4 vs Technical information zip.exe
                  Source: Technical information zip.exe, 00000000.00000002.305256005.000000000445B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs Technical information zip.exe
                  Source: Technical information zip.exe, 00000000.00000002.300920210.0000000003413000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs Technical information zip.exe
                  Source: Technical information zip.exe, 00000000.00000000.252119494.0000000000FD0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSharedL.exe: vs Technical information zip.exe
                  Source: Technical information zip.exe, 00000000.00000002.311262906.0000000007AB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs Technical information zip.exe
                  Source: Technical information zip.exe, 00000000.00000002.298204334.0000000001748000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Technical information zip.exe
                  Source: Technical information zip.exe, 00000000.00000002.311693868.0000000007C50000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameDoncepre.dll@ vs Technical information zip.exe
                  Source: Technical information zip.exe, 00000000.00000002.299934426.00000000033AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamezznbyWxpDWxUCOhKNmqQnkhPaGcZHEXDqEsKkZ.exe4 vs Technical information zip.exe
                  Source: Technical information zip.exe, 00000006.00000000.294305896.0000000000438000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamezznbyWxpDWxUCOhKNmqQnkhPaGcZHEXDqEsKkZ.exe4 vs Technical information zip.exe
                  Source: Technical information zip.exeBinary or memory string: OriginalFilenameSharedL.exe: vs Technical information zip.exe
                  Source: Technical information zip.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                  Source: Technical information zip.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: Technical information zip.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\Technical information zip.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\Technical information zip.exe "C:\Users\user\Desktop\Technical information zip.exe"
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess created: C:\Users\user\Desktop\Technical information zip.exe C:\Users\user\Desktop\Technical information zip.exe
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess created: C:\Users\user\Desktop\Technical information zip.exe C:\Users\user\Desktop\Technical information zip.exeJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\Technical information zip.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Technical information zip.exe.logJump to behavior
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/0
                  Source: Technical information zip.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\Technical information zip.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: Technical information zip.exe, Scraper/Archiving/Zip/Compression/Streams/InflaterInputBuffer.csCryptographic APIs: 'TransformBlock'
                  Source: Technical information zip.exe, Scraper/Archiving/Zip/Compression/Streams/InflaterInputBuffer.csCryptographic APIs: 'TransformBlock'
                  Source: Technical information zip.exe, Scraper/Archiving/Zip/Compression/Streams/DeflaterOutputStream.csCryptographic APIs: 'TransformBlock'
                  Source: Technical information zip.exe, Scraper/frmMain.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 0.0.Technical information zip.exe.ee0000.0.unpack, Scraper/Archiving/Zip/Compression/Streams/DeflaterOutputStream.csCryptographic APIs: 'TransformBlock'
                  Source: 0.0.Technical information zip.exe.ee0000.0.unpack, Scraper/Archiving/Zip/Compression/Streams/InflaterInputBuffer.csCryptographic APIs: 'TransformBlock'
                  Source: 0.0.Technical information zip.exe.ee0000.0.unpack, Scraper/Archiving/Zip/Compression/Streams/InflaterInputBuffer.csCryptographic APIs: 'TransformBlock'
                  Source: 0.0.Technical information zip.exe.ee0000.0.unpack, Scraper/frmMain.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 6.0.Technical information zip.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 6.0.Technical information zip.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: C:\Users\user\Desktop\Technical information zip.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: Technical information zip.exeStatic file information: File size 1343488 > 1048576
                  Source: Technical information zip.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: Technical information zip.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Data Obfuscation

                  barindex
                  Source: Technical information zip.exe, Scraper/frmMain.cs.Net Code: WaitHandle System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: 0.0.Technical information zip.exe.ee0000.0.unpack, Scraper/frmMain.cs.Net Code: WaitHandle System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.613311750792489
                  Source: C:\Users\user\Desktop\Technical information zip.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: 00000000.00000002.304226940.0000000003620000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.299934426.00000000033AB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Technical information zip.exe PID: 4828, type: MEMORYSTR
                  Source: Technical information zip.exe, 00000000.00000002.304226940.0000000003620000.00000004.00000800.00020000.00000000.sdmp, Technical information zip.exe, 00000000.00000002.299934426.00000000033AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: Technical information zip.exe, 00000000.00000002.304226940.0000000003620000.00000004.00000800.00020000.00000000.sdmp, Technical information zip.exe, 00000000.00000002.299934426.00000000033AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                  Source: C:\Users\user\Desktop\Technical information zip.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\Technical information zip.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Users\user\Desktop\Technical information zip.exe TID: 1400Thread sleep time: -45877s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exe TID: 5596Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exe TID: 4776Thread sleep time: -15679732462653109s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exe TID: 6072Thread sleep count: 9844 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeWindow / User API: threadDelayed 9844Jump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeThread delayed: delay time: 45877Jump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: Technical information zip.exe, 00000000.00000002.299934426.00000000033AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: Technical information zip.exe, 00000000.00000002.299934426.00000000033AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: Technical information zip.exe, 00000000.00000002.299934426.00000000033AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: Technical information zip.exe, 00000006.00000002.525531534.00000000015C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: Technical information zip.exe, 00000000.00000002.299934426.00000000033AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\Technical information zip.exeMemory written: C:\Users\user\Desktop\Technical information zip.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeProcess created: C:\Users\user\Desktop\Technical information zip.exe C:\Users\user\Desktop\Technical information zip.exeJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Users\user\Desktop\Technical information zip.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Users\user\Desktop\Technical information zip.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.Technical information zip.exe.4493998.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Technical information zip.exe.44c9bb8.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.Technical information zip.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Technical information zip.exe.44c9bb8.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Technical information zip.exe.445b978.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Technical information zip.exe.4493998.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.305256005.000000000445B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000000.293840755.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.527868401.0000000003301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Technical information zip.exe PID: 4828, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Technical information zip.exe PID: 6128, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\Technical information zip.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                  Source: C:\Users\user\Desktop\Technical information zip.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: Yara matchFile source: 00000006.00000002.527868401.0000000003301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Technical information zip.exe PID: 6128, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.Technical information zip.exe.4493998.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Technical information zip.exe.44c9bb8.8.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.0.Technical information zip.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Technical information zip.exe.44c9bb8.8.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Technical information zip.exe.445b978.6.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.Technical information zip.exe.4493998.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.305256005.000000000445B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000000.293840755.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.527868401.0000000003301000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Technical information zip.exe PID: 4828, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Technical information zip.exe PID: 6128, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts211
                  Windows Management Instrumentation
                  Path Interception111
                  Process Injection
                  1
                  Masquerading
                  2
                  OS Credential Dumping
                  1
                  Query Registry
                  Remote Services1
                  Input Capture
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                  Disable or Modify Tools
                  1
                  Input Capture
                  211
                  Security Software Discovery
                  Remote Desktop Protocol11
                  Archive Collected Data
                  Exfiltration Over Bluetooth1
                  Non-Application Layer Protocol
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
                  Virtualization/Sandbox Evasion
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin Shares2
                  Data from Local System
                  Automated Exfiltration1
                  Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                  Process Injection
                  NTDS131
                  Virtualization/Sandbox Evasion
                  Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                  Deobfuscate/Decode Files or Information
                  LSA Secrets1
                  Application Window Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common1
                  Obfuscated Files or Information
                  Cached Domain Credentials113
                  System Information Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items13
                  Software Packing
                  DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Technical information zip.exe10%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                  No Antivirus matches
                  SourceDetectionScannerLabelLinkDownload
                  6.0.Technical information zip.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  https://GQ0wtPGdRTxOSCfi6tDx.net0%Avira URL Cloudsafe
                  http://cabletraychina.com0%Avira URL Cloudsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://YXbeSX.com0%Avira URL Cloudsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://boards.4chan.org3Retrieving0%Avira URL Cloudsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  http://mail.cabletraychina.com0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  cabletraychina.com
                  162.215.255.143
                  truetrue
                    unknown
                    mail.cabletraychina.com
                    unknown
                    unknowntrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://127.0.0.1:HTTP/1.1Technical information zip.exe, 00000006.00000002.527868401.0000000003301000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      low
                      http://www.apache.org/licenses/LICENSE-2.0Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.comTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designersGTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://DynDns.comDynDNSTechnical information zip.exe, 00000006.00000002.527868401.0000000003301000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/?Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.founder.com.cn/cn/bTheTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haTechnical information zip.exe, 00000006.00000002.527868401.0000000003301000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://boards.4chan.org/b/Technical information zip.exefalse
                                high
                                http://www.fontbureau.com/designers?Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.tiro.comTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designersTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://GQ0wtPGdRTxOSCfi6tDx.netTechnical information zip.exe, 00000006.00000002.535012857.0000000003661000.00000004.00000800.00020000.00000000.sdmp, Technical information zip.exe, 00000006.00000002.534899990.000000000364F000.00000004.00000800.00020000.00000000.sdmp, Technical information zip.exe, 00000006.00000002.534929052.0000000003653000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://cabletraychina.comTechnical information zip.exe, 00000006.00000002.534958591.0000000003659000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.goodfont.co.krTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.carterandcone.comlTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.sajatypeworks.comTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.typography.netDTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/cabarga.htmlNTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/cTheTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.galapagosdesign.com/staff/dennis.htmTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://fontfabrik.comTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.founder.com.cn/cnTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers/frere-user.htmlTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://YXbeSX.comTechnical information zip.exe, 00000006.00000002.527868401.0000000003301000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.jiyu-kobo.co.jp/Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.galapagosdesign.com/DPleaseTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.fontbureau.com/designers8Technical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://boards.4chan.org3RetrievingTechnical information zip.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.fonts.comTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.sandoll.co.krTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            http://images.4chan.org/Technical information zip.exefalse
                                              high
                                              http://www.urwpp.deDPleaseTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.zhongyicts.com.cnTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://www.sakkal.comTechnical information zip.exe, 00000000.00000002.309109555.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipTechnical information zip.exe, 00000000.00000002.305256005.000000000445B000.00000004.00000800.00020000.00000000.sdmp, Technical information zip.exe, 00000006.00000000.293840755.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              http://mail.cabletraychina.comTechnical information zip.exe, 00000006.00000002.534958591.0000000003659000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              No contacted IP infos
                                              Joe Sandbox Version:35.0.0 Citrine
                                              Analysis ID:680483
                                              Start date and time: 08/08/202217:20:352022-08-08 17:20:35 +02:00
                                              Joe Sandbox Product:CloudBasic
                                              Overall analysis duration:0h 8m 43s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Sample file name:Technical information zip.exe
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                              Number of analysed new started processes analysed:23
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • HDC enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.evad.winEXE@3/1@2/0
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HDC Information:Failed
                                              HCA Information:
                                              • Successful, ratio: 97%
                                              • Number of executed functions: 32
                                              • Number of non-executed functions: 0
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Adjust boot time
                                              • Enable AMSI
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                              • Excluded IPs from analysis (whitelisted): 23.211.6.115, 52.152.110.14, 20.54.89.106, 40.125.122.176, 20.223.24.244, 52.242.101.226
                                              • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, arc.msn.com, e12564.dspb.akamaiedge.net, rp-consumer-prod-displaycatalog-geomap.trafficmanager.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              TimeTypeDescription
                                              17:21:59API Interceptor607x Sleep call for process: Technical information zip.exe modified
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                              No context
                                              No context
                                              No context
                                              Process:C:\Users\user\Desktop\Technical information zip.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1308
                                              Entropy (8bit):5.345811588615766
                                              Encrypted:false
                                              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                              MD5:2E016B886BDB8389D2DD0867BE55F87B
                                              SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                              SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                              SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):6.803329289885253
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                              • Win32 Executable (generic) a (10002005/4) 49.78%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              • DOS Executable Generic (2002/1) 0.01%
                                              File name:Technical information zip.exe
                                              File size:1343488
                                              MD5:ca033c84f5a37105d613c6961b724e97
                                              SHA1:23f023abfef70de9ee2c909fbef985254b2abe26
                                              SHA256:bfcb8ee096a65d7ec9201b67df585a7e715aaaa0aa2dcfec2e6ff208b3559498
                                              SHA512:24efc400092f7fa258e68b2326ad9e075643aa007b7c2de0d50fa0379821e0ea797d2ed771687193e1bc0c3ebd486e59a627743d3094640af859f3e6e47383e2
                                              SSDEEP:24576:VmZs7cDzhEUKK1j2iU3AMYnC1e9IbUDHDl:Vm67c3xXfU3RYn07U
                                              TLSH:8A559E17AFA076C8F4B75BB9DC1F68D043F5EC09616AD2692E5078BA1FBA301D401E27
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....c.b..............0.................. ........@.. ....................................@................................
                                              Icon Hash:f0f0ccd6d4c4f0e8
                                              Entrypoint:0x4edb02
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x62F06317 [Mon Aug 8 01:12:55 2022 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              mov bh, 1Dh
                                              rol dword ptr [esi+ebp*2], 3Bh
                                              or byte ptr [ecx], FFFFFFD9h
                                              inc ebx
                                              or eax, 130476DCh
                                              imul ebp, dword ptr [ebx-3Bh], 17h
                                              mov dl, 4Dh
                                              xchg byte ptr [edx], bl
                                              add eax, B81E4750h
                                              in eax, dx
                                              or byte ptr [esi], ah
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xedab00x4f.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xf00000x5ab5c.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x14c0000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000xece800xed000False0.747269127439346data7.613311750792489IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rsrc0xf00000x5ab5c0x5ac00False0.0600330363292011data2.6135874634094827IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x14c0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountry
                                              RT_ICON0xf02080x42028data
                                              RT_ICON0x1322300x468GLS_BINARY_LSB_FIRST
                                              RT_ICON0x1326980x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
                                              RT_ICON0x134c400x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
                                              RT_ICON0x135ce80x10828dBase III DBT, version number 0, next free block index 40
                                              RT_ICON0x1465100x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
                                              RT_GROUP_ICON0x14a7380x5adata
                                              RT_GROUP_ICON0x14a7940x3edata
                                              RT_VERSION0x14a7d40x388data
                                              DLLImport
                                              mscoree.dll_CorExeMain
                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                              192.168.2.4162.215.255.143497805872840032 08/08/22-17:23:56.548969TCP2840032ETPRO TROJAN Win32/AgentTesla/OriginLogger Data Exfil via SMTP M249780587192.168.2.4162.215.255.143
                                              192.168.2.4162.215.255.143497805872839723 08/08/22-17:23:56.548892TCP2839723ETPRO TROJAN Win32/Agent Tesla SMTP Activity49780587192.168.2.4162.215.255.143
                                              192.168.2.4162.215.255.143497805872851779 08/08/22-17:23:56.548969TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49780587192.168.2.4162.215.255.143
                                              192.168.2.4162.215.255.143497805872030171 08/08/22-17:23:56.548892TCP2030171ET TROJAN AgentTesla Exfil Via SMTP49780587192.168.2.4162.215.255.143
                                              TimestampSource PortDest PortSource IPDest IP
                                              Aug 8, 2022 17:23:54.512552977 CEST6064753192.168.2.48.8.8.8
                                              Aug 8, 2022 17:23:54.689174891 CEST53606478.8.8.8192.168.2.4
                                              Aug 8, 2022 17:23:54.692245960 CEST6490953192.168.2.48.8.8.8
                                              Aug 8, 2022 17:23:54.860028028 CEST53649098.8.8.8192.168.2.4
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                              Aug 8, 2022 17:23:54.512552977 CEST192.168.2.48.8.8.80xebe9Standard query (0)mail.cabletraychina.comA (IP address)IN (0x0001)
                                              Aug 8, 2022 17:23:54.692245960 CEST192.168.2.48.8.8.80x8e2aStandard query (0)mail.cabletraychina.comA (IP address)IN (0x0001)
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                              Aug 8, 2022 17:23:54.689174891 CEST8.8.8.8192.168.2.40xebe9No error (0)mail.cabletraychina.comcabletraychina.comCNAME (Canonical name)IN (0x0001)
                                              Aug 8, 2022 17:23:54.689174891 CEST8.8.8.8192.168.2.40xebe9No error (0)cabletraychina.com162.215.255.143A (IP address)IN (0x0001)
                                              Aug 8, 2022 17:23:54.860028028 CEST8.8.8.8192.168.2.40x8e2aNo error (0)mail.cabletraychina.comcabletraychina.comCNAME (Canonical name)IN (0x0001)
                                              Aug 8, 2022 17:23:54.860028028 CEST8.8.8.8192.168.2.40x8e2aNo error (0)cabletraychina.com162.215.255.143A (IP address)IN (0x0001)

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:17:21:46
                                              Start date:08/08/2022
                                              Path:C:\Users\user\Desktop\Technical information zip.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\Technical information zip.exe"
                                              Imagebase:0xee0000
                                              File size:1343488 bytes
                                              MD5 hash:CA033C84F5A37105D613C6961B724E97
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.305256005.000000000445B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.305256005.000000000445B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.305256005.000000000445B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.304226940.0000000003620000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.299934426.00000000033AB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low

                                              Target ID:6
                                              Start time:17:22:05
                                              Start date:08/08/2022
                                              Path:C:\Users\user\Desktop\Technical information zip.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\Desktop\Technical information zip.exe
                                              Imagebase:0xed0000
                                              File size:1343488 bytes
                                              MD5 hash:CA033C84F5A37105D613C6961B724E97
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000000.293840755.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000000.293840755.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000006.00000000.293840755.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.527868401.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.527868401.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000006.00000002.527868401.0000000003301000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                              Reputation:low

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:12.7%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:31
                                                Total number of Limit Nodes:2
                                                execution_graph 9413 579bff8 9414 579c00c 9413->9414 9415 579c031 9414->9415 9417 579bb58 9414->9417 9418 579c1d8 LoadLibraryExW 9417->9418 9420 579c251 9418->9420 9420->9415 9421 579dd70 9422 579ddd6 9421->9422 9425 579df30 9422->9425 9428 579bee0 9425->9428 9429 579df98 DuplicateHandle 9428->9429 9430 579de85 9429->9430 9431 579bf50 9432 579bf98 GetModuleHandleW 9431->9432 9433 579bf92 9431->9433 9434 579bfc5 9432->9434 9433->9432 9435 5794210 9436 579422c 9435->9436 9437 579423d 9436->9437 9439 5794389 9436->9439 9440 57943ad 9439->9440 9444 5794478 9440->9444 9448 5794488 9440->9448 9446 57944af 9444->9446 9445 579458c 9445->9445 9446->9445 9452 5793f84 9446->9452 9449 57944af 9448->9449 9450 579458c 9449->9450 9451 5793f84 CreateActCtxA 9449->9451 9451->9450 9453 5795518 CreateActCtxA 9452->9453 9455 57955db 9453->9455 9455->9455

                                                Control-flow Graph

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.307328761.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5790000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fb534481214a6eb9dff560653d1e7ea79f082f6b9d4dbff44088e946f9b343c0
                                                • Instruction ID: 913dc605b119360fdc7f47812136477304ea421b6a219669ba0e83099e704b42
                                                • Opcode Fuzzy Hash: fb534481214a6eb9dff560653d1e7ea79f082f6b9d4dbff44088e946f9b343c0
                                                • Instruction Fuzzy Hash: 2662FB34A00219CFCB54DBA4C994BEDB7B2FF89304F2085A9D40AAB354DB35AD89DF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.307328761.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5790000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 690045e94acda1aba85bb3d0a5524c4ebfe670ce472cfe855a6cdef31a08a1b9
                                                • Instruction ID: 98dc7119ddb002b15e22f22b1d1fb76879ad5af9bde08389dbc6d98373be06b6
                                                • Opcode Fuzzy Hash: 690045e94acda1aba85bb3d0a5524c4ebfe670ce472cfe855a6cdef31a08a1b9
                                                • Instruction Fuzzy Hash: DE62EB34A00219CFCB54DBA4C994BEDB7B2FF89304F1085A9D40AAB354DB35AE89DF51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 5793f84-57955d9 CreateActCtxA 3 57955db-57955e1 0->3 4 57955e2-579563c 0->4 3->4 11 579564b-579564f 4->11 12 579563e-5795641 4->12 13 5795651-579565d 11->13 14 5795660 11->14 12->11 13->14 15 5795661 14->15 15->15
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 057955C9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.307328761.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5790000_Technical information zip.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 956a91b5ffa2fea1be1be83987bd576ad0609d060e96a0198371515960c505ec
                                                • Instruction ID: 871f0ae3777a10ffd4cbec0c7f5d16585dd41c6e19ca9a5a161e69e6a5330e9f
                                                • Opcode Fuzzy Hash: 956a91b5ffa2fea1be1be83987bd576ad0609d060e96a0198371515960c505ec
                                                • Instruction Fuzzy Hash: CA41D271C0066CCBDF24DFAAC984BDDBBB6BF48304F208069D409AB251DB756949CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 17 579550c-579550e 18 5795518-57955d9 CreateActCtxA 17->18 20 57955db-57955e1 18->20 21 57955e2-579563c 18->21 20->21 28 579564b-579564f 21->28 29 579563e-5795641 21->29 30 5795651-579565d 28->30 31 5795660 28->31 29->28 30->31 32 5795661 31->32 32->32
                                                APIs
                                                • CreateActCtxA.KERNEL32(?), ref: 057955C9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.307328761.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5790000_Technical information zip.jbxd
                                                Similarity
                                                • API ID: Create
                                                • String ID:
                                                • API String ID: 2289755597-0
                                                • Opcode ID: 029f74f7de15927e1ff8df9f0cdcdcd8e2c3c678cf28833eea2a4cfc8bf64028
                                                • Instruction ID: 6e08e308d159512b5bd94f1c27eb8a9e946e12cddca619a5fa1e075f3f2eb4e1
                                                • Opcode Fuzzy Hash: 029f74f7de15927e1ff8df9f0cdcdcd8e2c3c678cf28833eea2a4cfc8bf64028
                                                • Instruction Fuzzy Hash: 0F41D071C00668CBDB24CFAAC985BDEBBB5BF48304F248169D409BB251DB756949CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 34 579bee0-579e02c DuplicateHandle 36 579e02e-579e034 34->36 37 579e035-579e052 34->37 36->37
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0579DF5E,?,?,?,?,?), ref: 0579E01F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.307328761.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5790000_Technical information zip.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: c7c1d710c0bff69315b0601b1e26eb29778032bc2e8793dba20bda051a6b7717
                                                • Instruction ID: 8f74300500fd1957ec76512e0e91304a4975f6292115b6f068ff871e898abd38
                                                • Opcode Fuzzy Hash: c7c1d710c0bff69315b0601b1e26eb29778032bc2e8793dba20bda051a6b7717
                                                • Instruction Fuzzy Hash: FB21E3B5D00209AFDF10CF9AD984AEEBBF9EB48320F14841AE914A7710D374A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 40 579bb58-579c218 42 579c21a-579c21d 40->42 43 579c220-579c24f LoadLibraryExW 40->43 42->43 44 579c258-579c275 43->44 45 579c251-579c257 43->45 45->44
                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0579C031,00000800,00000000,00000000), ref: 0579C242
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.307328761.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5790000_Technical information zip.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: 8a614ef3c825fa7a787f88e778b2b6a9a6290d03096befec048edfe35a188a46
                                                • Instruction ID: 06e3f1cb2be42976880ddc46f481699fb727c7d0f88a0c6cd985c52bbfb8aea0
                                                • Opcode Fuzzy Hash: 8a614ef3c825fa7a787f88e778b2b6a9a6290d03096befec048edfe35a188a46
                                                • Instruction Fuzzy Hash: 051114B69002499FDF14CF9AD444BDEFBF8EB48320F04842AE915A7710C374A945CFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 48 579bf50-579bf90 49 579bf98-579bfc3 GetModuleHandleW 48->49 50 579bf92-579bf95 48->50 51 579bfcc-579bfe0 49->51 52 579bfc5-579bfcb 49->52 50->49 52->51
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 0579BFB6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.307328761.0000000005790000.00000040.00000800.00020000.00000000.sdmp, Offset: 05790000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5790000_Technical information zip.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 24fdf8e84a53507ad340d3cc6fe8697d14e844488b7700b41ae1849864cb7f00
                                                • Instruction ID: 417350b0fde8896d943bda4e8514af76101f653e5d18cd8f7cd5033e4f51237e
                                                • Opcode Fuzzy Hash: 24fdf8e84a53507ad340d3cc6fe8697d14e844488b7700b41ae1849864cb7f00
                                                • Instruction Fuzzy Hash: 5811DFB6D042498FCB14CF9AE444BDEFBF5AB88224F14842AD429B7710C374A545CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.297351637.00000000015DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015DD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_15dd000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 11927c4e47cfad7f61b79f1967f72d1178fd36710313d697605969ef0074921c
                                                • Instruction ID: 0d3ad9af5b803b789a9f00be07a70aaa598dfa01763186d657a00b0a6eb9f35f
                                                • Opcode Fuzzy Hash: 11927c4e47cfad7f61b79f1967f72d1178fd36710313d697605969ef0074921c
                                                • Instruction Fuzzy Hash: 4D21F472504240DFDB25DF58D9C0B9ABFB5FB84324F24C569D8050F686C37AE846C7A1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.297351637.00000000015DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015DD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_15dd000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8cc83501dc99375757d260ec97355aa4d3f25810d83cf4f83fb3b26eef458a2f
                                                • Instruction ID: 9ca5156bfacae36e9f59c25ef8ad5329a89e5d680c7a73525fdf30bdec793db6
                                                • Opcode Fuzzy Hash: 8cc83501dc99375757d260ec97355aa4d3f25810d83cf4f83fb3b26eef458a2f
                                                • Instruction Fuzzy Hash: 502128B1504240EFDB21DF98D9C0B6ABFB5FB88328F648969D8050F687C336D855CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.297422844.00000000015ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_15ed000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fef426f02d63b73b4d0e2aa527cff612f8d8dd4580199b86f8041e49af23e720
                                                • Instruction ID: 5c90b12d2defad529e6d75273ac622d398f75aeeb68e9c0c3387d341c79e83c0
                                                • Opcode Fuzzy Hash: fef426f02d63b73b4d0e2aa527cff612f8d8dd4580199b86f8041e49af23e720
                                                • Instruction Fuzzy Hash: 6321FF75A042409FDB19CF54D8C8B2ABFF1FB84264F28C969D8094F646D33AD806CAA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.297422844.00000000015ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_15ed000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 53cf5f0e361b44357f0e540892ae43f092cf327c783e5927d3e9bd85bffd73db
                                                • Instruction ID: 5820348888a1488ee1e405c0a2d0922839f057f72acf19f0900316db1f359293
                                                • Opcode Fuzzy Hash: 53cf5f0e361b44357f0e540892ae43f092cf327c783e5927d3e9bd85bffd73db
                                                • Instruction Fuzzy Hash: BD210375904240EFDB09CF54D9C4B2ABBF1FB84224F20CAA9D8094F642C33AD806CA61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.297422844.00000000015ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_15ed000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1143de718383b7f365e11a37391d10965a4d4cf82d784cead8f596539e39980d
                                                • Instruction ID: 507c0bc1eaf75739c601ef955c5d7ddbca42379d28c0b92be70c5576c9100662
                                                • Opcode Fuzzy Hash: 1143de718383b7f365e11a37391d10965a4d4cf82d784cead8f596539e39980d
                                                • Instruction Fuzzy Hash: F4218E755093808FCB06CF24D994B15BFB1FB46214F28C5EAD8498F667C33A980ACB62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.297351637.00000000015DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015DD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_15dd000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 48a914f4b93efc25090f91832e2dda59b37c651b77dec01b5b456fcbaac91247
                                                • Instruction ID: 8b1a45a8e88b40751142cac568ec1d45829faa98fa865bedb984a73cfbcb2e12
                                                • Opcode Fuzzy Hash: 48a914f4b93efc25090f91832e2dda59b37c651b77dec01b5b456fcbaac91247
                                                • Instruction Fuzzy Hash: F011B176404280CFCB12CF58D9C4B5ABF71FB84324F24C6A9D8040B657C37AE456CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.297351637.00000000015DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015DD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_15dd000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 48a914f4b93efc25090f91832e2dda59b37c651b77dec01b5b456fcbaac91247
                                                • Instruction ID: 7bc98a4e2ca5ea695c512167cf14dafd7f085b495d98af3a1b6a0f5f5ced9faa
                                                • Opcode Fuzzy Hash: 48a914f4b93efc25090f91832e2dda59b37c651b77dec01b5b456fcbaac91247
                                                • Instruction Fuzzy Hash: 9811B176404280CFCB12CF58D9C4B1ABF72FB88324F24C6A9D8054B657C33AD45ACBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.297422844.00000000015ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 015ED000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_15ed000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e43bc81a3ff9705b917d63333e3be4ed1b9938392dd5ea36af53da639c8dcacc
                                                • Instruction ID: 9044518eb4ad6309168eaa23dfcca812aeb6f4d157a37038f8c6367281019455
                                                • Opcode Fuzzy Hash: e43bc81a3ff9705b917d63333e3be4ed1b9938392dd5ea36af53da639c8dcacc
                                                • Instruction Fuzzy Hash: 9C118B75904280DFDB16CF54D5C4B19FFB1FB84224F28C6AAD8494B656C33AD84ACB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.297351637.00000000015DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015DD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_15dd000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 22ad4ba6ea33db359071fb8519c751616639ea2be117be8abdfe83bcc1454317
                                                • Instruction ID: 648665d4ee5c11b7840a3c0fd15309beeb3e2ef9e3610951661eba7661ef758e
                                                • Opcode Fuzzy Hash: 22ad4ba6ea33db359071fb8519c751616639ea2be117be8abdfe83bcc1454317
                                                • Instruction Fuzzy Hash: E601D832508384AAE7204B59CC84766FBE8FF41224F09849AE9084E787C7799844C7B1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.297351637.00000000015DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015DD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_15dd000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1188133e7ebdafaa95b633e6b961cb01b678a7f9a74ec76995611e111bb2bc15
                                                • Instruction ID: 48fa3ee5c4c5c8e1f61b85a1843def6eaedf90a52af92dcfc062c9010b0b2e8a
                                                • Opcode Fuzzy Hash: 1188133e7ebdafaa95b633e6b961cb01b678a7f9a74ec76995611e111bb2bc15
                                                • Instruction Fuzzy Hash: 64F06272404384AEE7218A59DC84B66FFA8EF41675F18C45AED085F787C379A844CBB1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Execution Graph

                                                Execution Coverage:11.7%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:86
                                                Total number of Limit Nodes:5
                                                execution_graph 13626 17dd01c 13627 17dd034 13626->13627 13628 17dd08e 13627->13628 13633 312359c 13627->13633 13641 3125248 13627->13641 13645 3125238 13627->13645 13649 3127b80 13627->13649 13634 31235a7 13633->13634 13635 3127bf1 13634->13635 13637 3127be1 13634->13637 13665 312779c 13635->13665 13657 3127d18 13637->13657 13661 3127d08 13637->13661 13638 3127bef 13642 312526e 13641->13642 13643 312359c CallWindowProcW 13642->13643 13644 312528f 13643->13644 13644->13628 13646 3125248 13645->13646 13647 312359c CallWindowProcW 13646->13647 13648 312528f 13647->13648 13648->13628 13652 3127bbd 13649->13652 13650 3127bf1 13651 312779c CallWindowProcW 13650->13651 13654 3127bef 13651->13654 13652->13650 13653 3127be1 13652->13653 13655 3127d18 CallWindowProcW 13653->13655 13656 3127d08 CallWindowProcW 13653->13656 13655->13654 13656->13654 13659 3127d26 13657->13659 13658 312779c CallWindowProcW 13658->13659 13659->13658 13660 3127e1b 13659->13660 13660->13638 13663 3127d26 13661->13663 13662 312779c CallWindowProcW 13662->13663 13663->13662 13664 3127e1b 13663->13664 13664->13638 13666 31277a7 13665->13666 13667 3127eea CallWindowProcW 13666->13667 13668 3127e99 13666->13668 13667->13668 13668->13638 13669 3125090 13670 31250f8 CreateWindowExW 13669->13670 13672 31251b4 13670->13672 13672->13672 13673 312ba20 13674 312ba34 13673->13674 13677 312bc6a 13674->13677 13683 312bd40 13677->13683 13688 312bd50 13677->13688 13693 312be4c 13677->13693 13698 312be66 13677->13698 13684 312bd94 13683->13684 13685 312be8b 13684->13685 13703 312c148 13684->13703 13708 312c199 13684->13708 13689 312bd94 13688->13689 13690 312be8b 13689->13690 13691 312c148 2 API calls 13689->13691 13692 312c199 2 API calls 13689->13692 13691->13690 13692->13690 13694 312bdff 13693->13694 13694->13693 13695 312be8b 13694->13695 13696 312c148 2 API calls 13694->13696 13697 312c199 2 API calls 13694->13697 13696->13695 13697->13695 13699 312be79 13698->13699 13700 312be8b 13698->13700 13701 312c148 2 API calls 13699->13701 13702 312c199 2 API calls 13699->13702 13701->13700 13702->13700 13704 312c166 13703->13704 13707 312c199 2 API calls 13704->13707 13716 312c1a8 13704->13716 13705 312c176 13705->13685 13707->13705 13709 312c1a2 13708->13709 13710 312c142 13708->13710 13712 312c20c RtlEncodePointer 13709->13712 13713 312c235 13709->13713 13714 312c1a8 RtlEncodePointer 13710->13714 13715 312c199 RtlEncodePointer 13710->13715 13711 312c176 13711->13685 13712->13713 13713->13685 13714->13711 13715->13711 13717 312c1e2 13716->13717 13718 312c20c RtlEncodePointer 13717->13718 13719 312c235 13717->13719 13718->13719 13719->13705 13720 3126940 GetCurrentProcess 13721 31269ba GetCurrentThread 13720->13721 13724 31269b3 13720->13724 13722 31269f0 13721->13722 13723 31269f7 GetCurrentProcess 13721->13723 13722->13723 13725 3126a2d 13723->13725 13724->13721 13726 3126a55 GetCurrentThreadId 13725->13726 13727 3126a86 13726->13727 13728 3126b68 DuplicateHandle 13729 3126bfe 13728->13729

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 031269A0
                                                • GetCurrentThread.KERNEL32 ref: 031269DD
                                                • GetCurrentProcess.KERNEL32 ref: 03126A1A
                                                • GetCurrentThreadId.KERNEL32 ref: 03126A73
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.526751243.0000000003120000.00000040.00000800.00020000.00000000.sdmp, Offset: 03120000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_3120000_Technical information zip.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID: f"zS
                                                • API String ID: 2063062207-594703487
                                                • Opcode ID: 1b98369a9392a7d53040421893a0e385387e6d77cef9043ffbfb34b319699888
                                                • Instruction ID: b66e5e08292a9c561cd30df20915340ac7e3d5c3ce683518024a957b891c5963
                                                • Opcode Fuzzy Hash: 1b98369a9392a7d53040421893a0e385387e6d77cef9043ffbfb34b319699888
                                                • Instruction Fuzzy Hash: 8D5166B4A002498FDB10DFAADA897DEBFF1EF49304F24815AD009A77A0D7749884CB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 031269A0
                                                • GetCurrentThread.KERNEL32 ref: 031269DD
                                                • GetCurrentProcess.KERNEL32 ref: 03126A1A
                                                • GetCurrentThreadId.KERNEL32 ref: 03126A73
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.526751243.0000000003120000.00000040.00000800.00020000.00000000.sdmp, Offset: 03120000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_3120000_Technical information zip.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID: f"zS
                                                • API String ID: 2063062207-594703487
                                                • Opcode ID: 2f2773874f49da64f611e517695bafd83f8537ade951df915ec5470fccd9466b
                                                • Instruction ID: f4ecc8d2a725f07d02adce651e39f5b792102469dab3de73a39781c92bdad31c
                                                • Opcode Fuzzy Hash: 2f2773874f49da64f611e517695bafd83f8537ade951df915ec5470fccd9466b
                                                • Instruction Fuzzy Hash: 725154B4A002498FDB10DFAAD649BEEBBF1EB48304F208059E419A77A0D7749884CB65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 40 3125084-31250f6 41 3125101-3125108 40->41 42 31250f8-31250fe 40->42 43 3125113-312514b 41->43 44 312510a-3125110 41->44 42->41 45 3125153-31251b2 CreateWindowExW 43->45 44->43 46 31251b4-31251ba 45->46 47 31251bb-31251f3 45->47 46->47 51 3125200 47->51 52 31251f5-31251f8 47->52 53 3125201 51->53 52->51 53->53
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 031251A2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.526751243.0000000003120000.00000040.00000800.00020000.00000000.sdmp, Offset: 03120000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_3120000_Technical information zip.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID: f"zS$f"zS
                                                • API String ID: 716092398-2253807152
                                                • Opcode ID: 129fd4182a9b01e28fc184e554f6b41939937d17b52317ae87c063a412569274
                                                • Instruction ID: 62f7c0af5d322127048794ef7525bb07078d62be161b541250de27ab0614003d
                                                • Opcode Fuzzy Hash: 129fd4182a9b01e28fc184e554f6b41939937d17b52317ae87c063a412569274
                                                • Instruction Fuzzy Hash: CD51C1B1D102199FDB14CFA9C984ADEFFB6FF48314F24822AE815AB210D7749985CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 54 3125090-31250f6 55 3125101-3125108 54->55 56 31250f8-31250fe 54->56 57 3125113-31251b2 CreateWindowExW 55->57 58 312510a-3125110 55->58 56->55 60 31251b4-31251ba 57->60 61 31251bb-31251f3 57->61 58->57 60->61 65 3125200 61->65 66 31251f5-31251f8 61->66 67 3125201 65->67 66->65 67->67
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 031251A2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.526751243.0000000003120000.00000040.00000800.00020000.00000000.sdmp, Offset: 03120000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_3120000_Technical information zip.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID: f"zS$f"zS
                                                • API String ID: 716092398-2253807152
                                                • Opcode ID: a1bdb1609a50d476d86d5997444d9cf540a3e6cec9fbd09b68d660a97e2cded9
                                                • Instruction ID: 44aeae716fc9e6a6285fc04779a19621d5862b06a757f38c828a1fab5a7bd40f
                                                • Opcode Fuzzy Hash: a1bdb1609a50d476d86d5997444d9cf540a3e6cec9fbd09b68d660a97e2cded9
                                                • Instruction Fuzzy Hash: 2941BEB1D103199FDB14CF99C984ADEFFB6BF48314F24812AE819AB210D7749985CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 106 312779c-3127e8c 109 3127e92-3127e97 106->109 110 3127f3c-3127f5c call 312359c 106->110 112 3127eea-3127f22 CallWindowProcW 109->112 113 3127e99-3127ed0 109->113 117 3127f5f-3127f6c 110->117 115 3127f24-3127f2a 112->115 116 3127f2b-3127f3a 112->116 119 3127ed2-3127ed8 113->119 120 3127ed9-3127ee8 113->120 115->116 116->117 119->120 120->117
                                                APIs
                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 03127F11
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.526751243.0000000003120000.00000040.00000800.00020000.00000000.sdmp, Offset: 03120000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_3120000_Technical information zip.jbxd
                                                Similarity
                                                • API ID: CallProcWindow
                                                • String ID: f"zS
                                                • API String ID: 2714655100-594703487
                                                • Opcode ID: 17304297b27d5b9215c423dfb82275c7d0b8d71e4866356ea3daab500fc69214
                                                • Instruction ID: 2b86ff909ae5c5cd2dfbdb06fdce660a965011551b2646652b98a73656ce0114
                                                • Opcode Fuzzy Hash: 17304297b27d5b9215c423dfb82275c7d0b8d71e4866356ea3daab500fc69214
                                                • Instruction Fuzzy Hash: 004129B5A00259CFCB14CF99C488AABBBF5FF8C314F158459E429A7761D774A841CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 123 312c199-312c1a0 124 312c142-312c166 call 312bd18 123->124 125 312c1a2-312c1ea 123->125 143 312c170 call 312c1a8 124->143 144 312c170 call 312c199 124->144 132 312c1f0 125->132 133 312c1ec-312c1ee 125->133 131 312c176-312c195 call 312bf68 134 312c1f5-312c200 132->134 133->134 136 312c202-312c233 RtlEncodePointer 134->136 137 312c261-312c26e 134->137 140 312c235-312c23b 136->140 141 312c23c-312c25c 136->141 140->141 141->137 143->131 144->131
                                                APIs
                                                • RtlEncodePointer.NTDLL(00000000), ref: 0312C222
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.526751243.0000000003120000.00000040.00000800.00020000.00000000.sdmp, Offset: 03120000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_3120000_Technical information zip.jbxd
                                                Similarity
                                                • API ID: EncodePointer
                                                • String ID: f"zS
                                                • API String ID: 2118026453-594703487
                                                • Opcode ID: 6128b1f80703a9a1098c6df1692c98340929f22129e9f5254f72a2e7be7f2dec
                                                • Instruction ID: 97574f2c9d762c2fb950ecba05e7be10f233209055cd256ab82f8107717ab105
                                                • Opcode Fuzzy Hash: 6128b1f80703a9a1098c6df1692c98340929f22129e9f5254f72a2e7be7f2dec
                                                • Instruction Fuzzy Hash: F2310E708053958FCB10EFA8E94A3DEBFF4EB4A704F18805AC408AB252CB385445CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 145 3126b62-3126bfc DuplicateHandle 146 3126c05-3126c22 145->146 147 3126bfe-3126c04 145->147 147->146
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 03126BEF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.526751243.0000000003120000.00000040.00000800.00020000.00000000.sdmp, Offset: 03120000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_3120000_Technical information zip.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID: f"zS
                                                • API String ID: 3793708945-594703487
                                                • Opcode ID: 2b42fb65281ecbfaabbdc6b907797bca24365a7e6a2edd12dd59ec8977cc310b
                                                • Instruction ID: 31308164d466ea2e1e2d8f354f9ff0f71e3d580407eff9283a42530e2514f46e
                                                • Opcode Fuzzy Hash: 2b42fb65281ecbfaabbdc6b907797bca24365a7e6a2edd12dd59ec8977cc310b
                                                • Instruction Fuzzy Hash: 5921DFB5D012499FDB10CFA9D984AEEBBF4EB48320F14851AE814A3750D378A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 150 3126b68-3126bfc DuplicateHandle 151 3126c05-3126c22 150->151 152 3126bfe-3126c04 150->152 152->151
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 03126BEF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.526751243.0000000003120000.00000040.00000800.00020000.00000000.sdmp, Offset: 03120000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_3120000_Technical information zip.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID: f"zS
                                                • API String ID: 3793708945-594703487
                                                • Opcode ID: c8bb658d5c940d95fbd0ce472aa15637f420a569db82fec6b18adf2c688eac3a
                                                • Instruction ID: 184da958f4e2ac05bae8cf76e7f8f9adfaf3962d204f8123f26046b92d4bf24a
                                                • Opcode Fuzzy Hash: c8bb658d5c940d95fbd0ce472aa15637f420a569db82fec6b18adf2c688eac3a
                                                • Instruction Fuzzy Hash: 2921E3B59002499FDB10CF99D984ADEFBF8EB48320F14841AE814A3750D374A954CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 155 312c1a8-312c1ea 158 312c1f0 155->158 159 312c1ec-312c1ee 155->159 160 312c1f5-312c200 158->160 159->160 161 312c202-312c233 RtlEncodePointer 160->161 162 312c261-312c26e 160->162 164 312c235-312c23b 161->164 165 312c23c-312c25c 161->165 164->165 165->162
                                                APIs
                                                • RtlEncodePointer.NTDLL(00000000), ref: 0312C222
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.526751243.0000000003120000.00000040.00000800.00020000.00000000.sdmp, Offset: 03120000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_3120000_Technical information zip.jbxd
                                                Similarity
                                                • API ID: EncodePointer
                                                • String ID: f"zS
                                                • API String ID: 2118026453-594703487
                                                • Opcode ID: 05c5b1153eda4ff959e168a5ba089d1d61628d3e7602fcb0e029813604a4f816
                                                • Instruction ID: 60f19d6ac29fc01d1e98e5c53e1ea1ac16092e3bbc717515ba8eaf9fa0c3f55f
                                                • Opcode Fuzzy Hash: 05c5b1153eda4ff959e168a5ba089d1d61628d3e7602fcb0e029813604a4f816
                                                • Instruction Fuzzy Hash: 4F11837090035A8FCB20EFA9D94979EBFF8EB49714F14802AD404A7640DB38A5858FA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000006.00000002.525840083.00000000017CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_17cd000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f961b2dc8782ac39e51b21779b1b4c0ea77324d6af0a660d30b80029d882f661
                                                • Instruction ID: f4a1dadb4c32fe73d39fe2288b6e3347d0effd919aceb875a19e938e764f1d34
                                                • Opcode Fuzzy Hash: f961b2dc8782ac39e51b21779b1b4c0ea77324d6af0a660d30b80029d882f661
                                                • Instruction Fuzzy Hash: 0421FEB1504240AFDB219F54E8C0BA7FB61FB88724F2085ADE9054A606C336E806CAE1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000006.00000002.525840083.00000000017CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_17cd000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d39d6994dcf01406a0493fbf583fbf160a513f621c3a97be527b78f8480158e2
                                                • Instruction ID: e6678bcb05dd1061928ad803815d0b9da924f4c953a147d31b310b6fe9e7a609
                                                • Opcode Fuzzy Hash: d39d6994dcf01406a0493fbf583fbf160a513f621c3a97be527b78f8480158e2
                                                • Instruction Fuzzy Hash: 802100B2500240EFDB11DF44E9C0B66FF61FB98728F2085BDE8054B646C336D806CAE1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000006.00000002.525926923.00000000017DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017DD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_17dd000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cb2d9740448c2714f0a2b8f258c596bdecd0a9000e678662ca05228c9083e218
                                                • Instruction ID: 0861a56d55391c40acdf18f178960f9db8bd803ea132eb374b032c4f159fa31e
                                                • Opcode Fuzzy Hash: cb2d9740448c2714f0a2b8f258c596bdecd0a9000e678662ca05228c9083e218
                                                • Instruction Fuzzy Hash: 1D212575604248DFDB21DF54D9C0B16FB75FB88354F24C9A9D8094B786C336D806CAA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000006.00000002.525926923.00000000017DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017DD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_17dd000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 821a3fd581a2a0af3458e4ab9fd5053a2eddfcbcbb98500b3a84d0b7fd16630b
                                                • Instruction ID: db782a7017558c0f54fd95bb09828d22bd5419f1aef51b69b8e83f1e66c6a2e3
                                                • Opcode Fuzzy Hash: 821a3fd581a2a0af3458e4ab9fd5053a2eddfcbcbb98500b3a84d0b7fd16630b
                                                • Instruction Fuzzy Hash: 872180754083849FCB12CF24D994B11BF71EB86214F28C5EAD8498B697C33AD846CB62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000006.00000002.525840083.00000000017CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_17cd000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 48a914f4b93efc25090f91832e2dda59b37c651b77dec01b5b456fcbaac91247
                                                • Instruction ID: b8676926949387e8af5e6b405688e21c660ccb978b2e8018cd50e424768908ec
                                                • Opcode Fuzzy Hash: 48a914f4b93efc25090f91832e2dda59b37c651b77dec01b5b456fcbaac91247
                                                • Instruction Fuzzy Hash: 9A11CA76404280CFCB12CF04E9C0B16FF71FB84324F2886ADD8054A617C33AD45ACBA2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000006.00000002.525840083.00000000017CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_17cd000_Technical information zip.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 48a914f4b93efc25090f91832e2dda59b37c651b77dec01b5b456fcbaac91247
                                                • Instruction ID: 7df1ff99db7797b95b0ea11acb927a4413b3b7b49679d684ffcb370e0de07777
                                                • Opcode Fuzzy Hash: 48a914f4b93efc25090f91832e2dda59b37c651b77dec01b5b456fcbaac91247
                                                • Instruction Fuzzy Hash: 6A11AF76504280CFCB12CF54D9C4B16FF72FB98724F2486ADD8094B616C33AD456CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%