Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rFACTURA_FAC_2023_1-1000733.PDF.exe

Overview

General Information

Sample Name:rFACTURA_FAC_2023_1-1000733.PDF.exe
Analysis ID:830399
MD5:a6ef5ed777ba7369c2bb28e46b198ba6
SHA1:f707bc0343f41d95f57e776a9f85f6a2c5791aa7
SHA256:878d710875b07ec61bef0b198ba67bf81ad0730a3a483d5762cd18e13fb4b525
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Writes to foreign memory regions
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
May check the online IP address of the machine
Uses an obfuscated file name to hide its real file extension (double extension)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
One or more processes crash
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Enables debug privileges
AV process strings found (often used to terminate AV products)
Found inlined nop instructions (likely shell or obfuscated code)
PE file does not import any functions
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Binary contains a suspicious time stamp
PE / OLE file has an invalid certificate
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64native
  • rFACTURA_FAC_2023_1-1000733.PDF.exe (PID: 8312 cmdline: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe MD5: A6EF5ED777BA7369C2BB28E46B198BA6)
    • CasPol.exe (PID: 6576 cmdline: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe MD5: 914F728C04D3EDDD5FBA59420E74E56B)
      • conhost.exe (PID: 3964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • WerFault.exe (PID: 8568 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6576 -s 2500 MD5: 40A149513D721F096DDF50C04DA2F01F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\antiphthisical\Primar\Cunicular\Densimetric\Talestrmmene.UnrJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1415606595.00000000048B0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
      0000000B.00000002.1786467995.0000000000FC0000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_5Yara detected GuLoaderJoe Security
        00000000.00000002.1415606595.0000000005E20000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          No Sigma rule has matched
          Timestamp:192.168.11.20132.226.8.16949801802039190 03/20/23-11:06:12.385242
          SID:2039190
          Source Port:49801
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeVirustotal: Detection: 20%Perma Link
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Replyingly\Avnbgen\SpisekamrenesJump to behavior
          Source: unknownHTTPS traffic detected: 142.250.181.238:443 -> 192.168.11.20:49799 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 142.250.185.193:443 -> 192.168.11.20:49800 version: TLS 1.2
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.pdb source: CasPol.exe, 0000000B.00000002.1880395156.0000000036380000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Xml.ni.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: @cn.pdb source: CasPol.exe, 0000000B.00000002.1875353906.0000000033F87000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.ni.pdbRSDS source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: mscorlib.pdb| source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: Microsoft.VisualBasic.pdb)Q source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\net6.0-Release\System.Reflection.Primitives.pdb source: System.Reflection.Primitives.dll.0.dr
          Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\net6.0-Release\System.Reflection.Primitives.pdb8+N+ @+_CorDllMainmscoree.dll source: System.Reflection.Primitives.dll.0.dr
          Source: Binary string: System.Reflection.TypeExtensions.ni.pdb source: System.Reflection.TypeExtensions.dll.0.dr
          Source: Binary string: C:\Windows\caspol.pdbpdbpol.pdb source: CasPol.exe, 0000000B.00000002.1880395156.0000000036380000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.ni.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: \??\C:\Windows\exe\caspol.pdby33o source: CasPol.exe, 0000000B.00000002.1880395156.0000000036380000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\exe\caspol.pdb source: CasPol.exe, 0000000B.00000002.1859898012.0000000003AEF000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: \??\C:\Windows\symbols\exe\caspol.pdbd source: CasPol.exe, 0000000B.00000002.1859898012.0000000003AEF000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Xml.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: System.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: System.Xml.ni.pdbRSDS# source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: ;6##.pdb source: CasPol.exe, 0000000B.00000002.1875353906.0000000033F87000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: Microsoft.VisualBasic.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: System.Core.ni.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: System.Windows.Forms.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: mscorlib.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: mscorlib.ni.pdbRSDSrMV9 source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.pdbGhY source: CasPol.exe, 0000000B.00000002.1880395156.0000000036380000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Windows.Forms.pdbp source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: mscorlib.ni.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: bwcaspol.PDB 8: source: CasPol.exe, 0000000B.00000002.1875353906.0000000033F87000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: caspol.pdb source: CasPol.exe, 0000000B.00000002.1880395156.0000000036380000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Core.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.TypeExtensions\net6.0-Release\System.Reflection.TypeExtensions.pdb source: System.Reflection.TypeExtensions.dll.0.dr
          Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: \??\C:\Windows\caspol.pdb source: CasPol.exe, 0000000B.00000002.1880395156.0000000036380000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: ?cnC:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.pdb source: CasPol.exe, 0000000B.00000002.1875353906.0000000033F87000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.PDBFiV source: CasPol.exe, 0000000B.00000002.1880395156.0000000036380000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ni.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: System.pdbSystem.Core.dll source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: 3symbols\exe\caspol.pdb source: CasPol.exe, 0000000B.00000002.1875353906.0000000033F87000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: 96HPWn,C:\Windows\caspol.pdb source: CasPol.exe, 0000000B.00000002.1875353906.0000000033F87000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.Core.ni.pdbRSDS source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: caspol.pdbcaspol.pdbpdbpol.pdb\v4.0.30319\caspol.pdbp source: CasPol.exe, 0000000B.00000002.1875353906.0000000033F87000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\exe\caspol.pdb source: CasPol.exe, 0000000B.00000002.1880395156.0000000036380000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_0040596D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_004065A2 FindFirstFileW,FindClose,
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_00402862 FindFirstFileW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4x nop then jmp 341978CCh
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h

          Networking

          barindex
          Source: TrafficSnort IDS: 2039190 ET TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.11.20:49801 -> 132.226.8.169:80
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: Joe Sandbox ViewASN Name: UTMEMUS UTMEMUS
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1XARcr4sm_5_dvnsnsVtsDOfjHfua_08k HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/mjejjps3gi1cd44ihbckcd43d7dn78od/1679306700000/12467729248612761337/*/1XARcr4sm_5_dvnsnsVtsDOfjHfua_08k?e=download&uuid=dc7be3b5-c5f0-4bcb-ad3e-a7d72194b047 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: doc-0s-a8-docs.googleusercontent.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49799
          Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49799 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: CasPol.exe, 0000000B.00000002.1876903989.00000000342A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
          Source: CasPol.exe, 0000000B.00000002.1876903989.0000000034291000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1876903989.00000000342A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
          Source: CasPol.exe, 0000000B.00000002.1876903989.00000000341E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/licenses/by-sa/4.0/
          Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#
          Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#Attribution
          Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#DerivativeWorks
          Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#Distribution
          Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#Notice
          Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#Reproduction
          Source: battery-level-90-charging-symbolic.svg.0.drString found in binary or memory: http://creativecommons.org/ns#ShareAlike
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://crl.certum.pl/ctnca.crl0k
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://crl.certum.pl/ctnca2.crl0l
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://crl.certum.pl/ctsca2021.crl0o
          Source: CasPol.exe, 0000000B.00000003.1385137269.0000000003A94000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
          Source: CasPol.exe, 0000000B.00000003.1385137269.0000000003A94000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000003.1389269538.0000000003AAA000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1859898012.0000000003AA9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://repository.certum.pl/ctnca.cer09
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://repository.certum.pl/ctnca2.cer09
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://repository.certum.pl/ctsca2021.cer0
          Source: CasPol.exe, 0000000B.00000002.1876903989.00000000341E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://subca.ocsp-certum.com01
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://subca.ocsp-certum.com02
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://subca.ocsp-certum.com05
          Source: Amcache.hve.LOG1.15.dr, Amcache.hve.15.drString found in binary or memory: http://upx.sf.net
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeString found in binary or memory: http://www.certum.pl/CPS0
          Source: CasPol.exe, 0000000B.00000003.1385137269.0000000003AC6000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000003.1385837889.0000000003AD9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://csp.withgoogle.com/csp/report-to/DriveUntrustedContentHttp/external
          Source: CasPol.exe, 0000000B.00000002.1859898012.0000000003A59000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000003.1389269538.0000000003AC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://doc-0s-a8-docs.googleusercontent.com/
          Source: CasPol.exe, 0000000B.00000002.1859898012.0000000003A59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://doc-0s-a8-docs.googleusercontent.com/#
          Source: CasPol.exe, 0000000B.00000003.1385137269.0000000003AC6000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1859898012.0000000003A90000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000003.1389269538.0000000003A90000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000003.1385837889.0000000003AD9000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1859898012.0000000003A78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://doc-0s-a8-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/mjejjps3
          Source: CasPol.exe, 0000000B.00000002.1859898012.0000000003A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/2
          Source: CasPol.exe, 0000000B.00000002.1859898012.0000000003A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/j
          Source: CasPol.exe, 0000000B.00000002.1859898012.0000000003A59000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1859898012.0000000003A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1XARcr4sm_5_dvnsnsVtsDOfjHfua_08k
          Source: CasPol.exe, 0000000B.00000002.1859898012.0000000003A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1XARcr4sm_5_dvnsnsVtsDOfjHfua_08kQ
          Source: CasPol.exe, 0000000B.00000002.1859898012.0000000003A59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1XARcr4sm_5_dvnsnsVtsDOfjHfua_08ktsv
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.1411917018.0000000000789000.00000004.00000001.01000000.00000003.sdmp, System.Reflection.Primitives.dll.0.dr, System.Reflection.TypeExtensions.dll.0.drString found in binary or memory: https://github.com/dotnet/runtime
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.1411917018.0000000000789000.00000004.00000001.01000000.00000003.sdmp, System.Reflection.TypeExtensions.dll.0.drString found in binary or memory: https://github.com/dotnet/runtimeBSJB
          Source: unknownDNS traffic detected: queries for: drive.google.com
          Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1XARcr4sm_5_dvnsnsVtsDOfjHfua_08k HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.comCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/mjejjps3gi1cd44ihbckcd43d7dn78od/1679306700000/12467729248612761337/*/1XARcr4sm_5_dvnsnsVtsDOfjHfua_08k?e=download&uuid=dc7be3b5-c5f0-4bcb-ad3e-a7d72194b047 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: doc-0s-a8-docs.googleusercontent.comConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: unknownHTTPS traffic detected: 142.250.181.238:443 -> 192.168.11.20:49799 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 142.250.185.193:443 -> 192.168.11.20:49800 version: TLS 1.2
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_00405402 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

          System Summary

          barindex
          Source: initial sampleStatic PE information: Filename: rFACTURA_FAC_2023_1-1000733.PDF.exe
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6576 -s 2500
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_00404C3F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_341934F2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_34196DDF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_34194858
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_341920D8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_341962EF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_34196300
          Source: System.Reflection.TypeExtensions.dll.0.drStatic PE information: No import functions for PE file found
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeSection loaded: edgegdi.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: edgegdi.dll
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeStatic PE information: invalid certificate
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeVirustotal: Detection: 20%
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeFile read: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeJump to behavior
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6576 -s 2500
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeFile created: C:\Users\user\AppData\Local\Temp\nsz1C6D.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/21@3/3
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_004020FE LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_004046C3 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,LdrInitializeThunk,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3964:304:WilStaging_02
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3964:120:WilError_03
          Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6576
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Replyingly\Avnbgen\SpisekamrenesJump to behavior
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.pdb source: CasPol.exe, 0000000B.00000002.1880395156.0000000036380000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Xml.ni.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: @cn.pdb source: CasPol.exe, 0000000B.00000002.1875353906.0000000033F87000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.ni.pdbRSDS source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: mscorlib.pdb| source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: Microsoft.VisualBasic.pdb)Q source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\net6.0-Release\System.Reflection.Primitives.pdb source: System.Reflection.Primitives.dll.0.dr
          Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.Primitives\net6.0-Release\System.Reflection.Primitives.pdb8+N+ @+_CorDllMainmscoree.dll source: System.Reflection.Primitives.dll.0.dr
          Source: Binary string: System.Reflection.TypeExtensions.ni.pdb source: System.Reflection.TypeExtensions.dll.0.dr
          Source: Binary string: C:\Windows\caspol.pdbpdbpol.pdb source: CasPol.exe, 0000000B.00000002.1880395156.0000000036380000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.ni.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: \??\C:\Windows\exe\caspol.pdby33o source: CasPol.exe, 0000000B.00000002.1880395156.0000000036380000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\symbols\exe\caspol.pdb source: CasPol.exe, 0000000B.00000002.1859898012.0000000003AEF000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Configuration.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: \??\C:\Windows\symbols\exe\caspol.pdbd source: CasPol.exe, 0000000B.00000002.1859898012.0000000003AEF000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Xml.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: System.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: System.Xml.ni.pdbRSDS# source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: ;6##.pdb source: CasPol.exe, 0000000B.00000002.1875353906.0000000033F87000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: Microsoft.VisualBasic.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: System.Core.ni.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: System.Windows.Forms.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: mscorlib.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: mscorlib.ni.pdbRSDSrMV9 source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.pdbGhY source: CasPol.exe, 0000000B.00000002.1880395156.0000000036380000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Windows.Forms.pdbp source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: mscorlib.ni.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: bwcaspol.PDB 8: source: CasPol.exe, 0000000B.00000002.1875353906.0000000033F87000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: caspol.pdb source: CasPol.exe, 0000000B.00000002.1880395156.0000000036380000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Core.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: D:\a\_work\1\s\artifacts\obj\System.Reflection.TypeExtensions\net6.0-Release\System.Reflection.TypeExtensions.pdb source: System.Reflection.TypeExtensions.dll.0.dr
          Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: \??\C:\Windows\caspol.pdb source: CasPol.exe, 0000000B.00000002.1880395156.0000000036380000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: ?cnC:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.pdb source: CasPol.exe, 0000000B.00000002.1875353906.0000000033F87000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.PDBFiV source: CasPol.exe, 0000000B.00000002.1880395156.0000000036380000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.ni.pdb source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: System.pdbSystem.Core.dll source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: 3symbols\exe\caspol.pdb source: CasPol.exe, 0000000B.00000002.1875353906.0000000033F87000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: 96HPWn,C:\Windows\caspol.pdb source: CasPol.exe, 0000000B.00000002.1875353906.0000000033F87000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: System.Core.ni.pdbRSDS source: WER2B2E.tmp.dmp.15.dr
          Source: Binary string: caspol.pdbcaspol.pdbpdbpol.pdb\v4.0.30319\caspol.pdbp source: CasPol.exe, 0000000B.00000002.1875353906.0000000033F87000.00000004.00000010.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\exe\caspol.pdb source: CasPol.exe, 0000000B.00000002.1880395156.0000000036380000.00000004.00000020.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 00000000.00000002.1415606595.0000000005E20000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1415606595.00000000048B0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.1786467995.0000000000FC0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\antiphthisical\Primar\Cunicular\Densimetric\Talestrmmene.Unr, type: DROPPED
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_10002DE0 push eax; ret
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_048B4C0D push edi; iretd
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_048B4C15 push edi; iretd
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_048B5A6C push cs; ret
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_048B2072 push FFFFFF83h; retf
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_048B7C71 push es; iretd
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_048B4BAE push edi; iretd
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_048B4BC1 push edi; iretd
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_048B71FA push esi; ret
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_048B7DFA pushfd ; retf
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_048B4B26 push eax; retf
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_048B0D3A pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00FC7C71 push es; iretd
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00FC2072 push FFFFFF83h; retf
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00FC5A6C push cs; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00FC4C15 push edi; iretd
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00FC4C0D push edi; iretd
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00FC71FA push esi; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00FC7DFA pushfd ; retf
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00FC4BC1 push edi; iretd
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00FC4BAE push edi; iretd
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00FC0D3A pushad ; ret
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 11_2_00FC4B26 push eax; retf
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
          Source: System.Reflection.Primitives.dll.0.drStatic PE information: 0xE40AD0DE [Wed Mar 28 09:54:38 2091 UTC]
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeFile created: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\System.Reflection.TypeExtensions.dllJump to dropped file
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeFile created: C:\Users\user\AppData\Local\Temp\nsp1D68.tmp\AdvSplash.dllJump to dropped file
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeFile created: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\antiphthisical\Primar\Cunicular\Densimetric\System.Reflection.Primitives.dllJump to dropped file
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeFile created: C:\Users\user\AppData\Local\Temp\nsp1D68.tmp\System.dllJump to dropped file

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: Possible double extension: pdf.exeStatic PE information: rFACTURA_FAC_2023_1-1000733.PDF.exe
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeFile opened: C:\Program Files\qga\qga.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\qga\qga.exe
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.1414281617.0000000000B58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEA
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.1414281617.0000000000B58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE0
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\System.Reflection.TypeExtensions.dllJump to dropped file
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\antiphthisical\Primar\Cunicular\Densimetric\System.Reflection.Primitives.dllJump to dropped file
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_0040596D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_004065A2 FindFirstFileW,FindClose,
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_00402862 FindFirstFileW,
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeSystem information queried: ModuleInformation
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeAPI call chain: ExitProcess graph end node
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeAPI call chain: ExitProcess graph end node
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.1463555266.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1862719819.00000000053F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.1463555266.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1862719819.00000000053F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
          Source: CasPol.exe, 0000000B.00000002.1862719819.00000000053F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.1463555266.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1862719819.00000000053F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.1463555266.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1862719819.00000000053F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.1463555266.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1862719819.00000000053F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
          Source: CasPol.exe, 0000000B.00000002.1862719819.00000000053F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
          Source: CasPol.exe, 0000000B.00000002.1859898012.0000000003A1B000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1859898012.0000000003A78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: Amcache.hve.15.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.1414281617.0000000000B58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exea
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.1463555266.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1862719819.00000000053F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.1414281617.0000000000B58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe0
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.1463555266.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1862719819.00000000053F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
          Source: rFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.1463555266.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1862719819.00000000053F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
          Source: CasPol.exe, 0000000B.00000002.1862719819.00000000053F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_00401E43 LdrInitializeThunk,ShowWindow,EnableWindow,
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMemory allocated: page read and write | page guard

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: FC0000
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exeCode function: 0_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,
          Source: Amcache.hve.15.drBinary or memory string: msmpeng.exe
          Source: Amcache.hve.15.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
          Source: Amcache.hve.15.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.2107.4-0\msmpeng.exe
          Source: CasPol.exe, 0000000B.00000002.1876903989.00000000341E1000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1876903989.00000000342A5000.00000004.00000800.00020000.00000000.sdmp, Amcache.hve.15.drBinary or memory string: MsMpEng.exe

          Stealing of Sensitive Information

          barindex
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Native API
          1
          Windows Service
          1
          Access Token Manipulation
          1
          Masquerading
          OS Credential Dumping211
          Security Software Discovery
          Remote Services1
          Email Collection
          Exfiltration Over Other Network Medium11
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
          System Shutdown/Reboot
          Default AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Windows Service
          1
          Virtualization/Sandbox Evasion
          LSASS Memory1
          Virtualization/Sandbox Evasion
          Remote Desktop Protocol1
          Archive Collected Data
          Exfiltration Over Bluetooth1
          Ingress Tool Transfer
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)111
          Process Injection
          1
          Disable or Modify Tools
          Security Account Manager1
          System Network Configuration Discovery
          SMB/Windows Admin Shares1
          Clipboard Data
          Automated Exfiltration2
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)1
          DLL Side-Loading
          1
          Access Token Manipulation
          NTDS2
          File and Directory Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer13
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script111
          Process Injection
          LSA Secrets16
          System Information Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common12
          Obfuscated Files or Information
          Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items1
          Timestomp
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          rFACTURA_FAC_2023_1-1000733.PDF.exe20%VirustotalBrowse
          rFACTURA_FAC_2023_1-1000733.PDF.exe5%ReversingLabsWin32.Trojan.Generic
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\System.Reflection.TypeExtensions.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\antiphthisical\Primar\Cunicular\Densimetric\System.Reflection.Primitives.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsp1D68.tmp\AdvSplash.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsp1D68.tmp\System.dll0%ReversingLabs
          No Antivirus matches
          SourceDetectionScannerLabelLink
          checkip.dyndns.com0%VirustotalBrowse
          checkip.dyndns.org0%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://checkip.dyndns.org/0%Avira URL Cloudsafe
          http://subca.ocsp-certum.com020%Avira URL Cloudsafe
          http://subca.ocsp-certum.com010%Avira URL Cloudsafe
          http://subca.ocsp-certum.com050%Avira URL Cloudsafe
          http://checkip.dyndns.org0%Avira URL Cloudsafe
          http://checkip.dyndns.org/0%VirustotalBrowse
          http://checkip.dyndns.org0%VirustotalBrowse
          https://csp.withgoogle.com/csp/report-to/DriveUntrustedContentHttp/external0%Avira URL Cloudsafe
          http://checkip.dyndns.com0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          drive.google.com
          142.250.181.238
          truefalse
            high
            googlehosted.l.googleusercontent.com
            142.250.185.193
            truefalse
              high
              checkip.dyndns.com
              132.226.8.169
              truetrueunknown
              checkip.dyndns.org
              unknown
              unknowntrueunknown
              doc-0s-a8-docs.googleusercontent.com
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://checkip.dyndns.org/true
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://doc-0s-a8-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/mjejjps3gi1cd44ihbckcd43d7dn78od/1679306700000/12467729248612761337/*/1XARcr4sm_5_dvnsnsVtsDOfjHfua_08k?e=download&uuid=dc7be3b5-c5f0-4bcb-ad3e-a7d72194b047false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://crl.certum.pl/ctsca2021.crl0orFACTURA_FAC_2023_1-1000733.PDF.exefalse
                    high
                    http://repository.certum.pl/ctnca.cer09rFACTURA_FAC_2023_1-1000733.PDF.exefalse
                      high
                      http://crl.certum.pl/ctnca.crl0krFACTURA_FAC_2023_1-1000733.PDF.exefalse
                        high
                        https://drive.google.com/2CasPol.exe, 0000000B.00000002.1859898012.0000000003A1B000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://creativecommons.org/ns#ShareAlikebattery-level-90-charging-symbolic.svg.0.drfalse
                            high
                            http://upx.sf.netAmcache.hve.LOG1.15.dr, Amcache.hve.15.drfalse
                              high
                              http://checkip.dyndns.orgCasPol.exe, 0000000B.00000002.1876903989.0000000034291000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1876903989.00000000342A5000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://nsis.sf.net/NSIS_ErrorErrorrFACTURA_FAC_2023_1-1000733.PDF.exefalse
                                high
                                https://doc-0s-a8-docs.googleusercontent.com/#CasPol.exe, 0000000B.00000002.1859898012.0000000003A59000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://creativecommons.org/ns#battery-level-90-charging-symbolic.svg.0.drfalse
                                    high
                                    https://github.com/dotnet/runtimerFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.1411917018.0000000000789000.00000004.00000001.01000000.00000003.sdmp, System.Reflection.Primitives.dll.0.dr, System.Reflection.TypeExtensions.dll.0.drfalse
                                      high
                                      http://creativecommons.org/ns#DerivativeWorksbattery-level-90-charging-symbolic.svg.0.drfalse
                                        high
                                        https://doc-0s-a8-docs.googleusercontent.com/CasPol.exe, 0000000B.00000002.1859898012.0000000003A59000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000003.1389269538.0000000003AC0000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://creativecommons.org/licenses/by-sa/4.0/battery-level-90-charging-symbolic.svg.0.drfalse
                                            high
                                            http://creativecommons.org/ns#Distributionbattery-level-90-charging-symbolic.svg.0.drfalse
                                              high
                                              http://repository.certum.pl/ctsca2021.cer0rFACTURA_FAC_2023_1-1000733.PDF.exefalse
                                                high
                                                http://subca.ocsp-certum.com05rFACTURA_FAC_2023_1-1000733.PDF.exefalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://creativecommons.org/ns#Attributionbattery-level-90-charging-symbolic.svg.0.drfalse
                                                  high
                                                  http://subca.ocsp-certum.com02rFACTURA_FAC_2023_1-1000733.PDF.exefalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://subca.ocsp-certum.com01rFACTURA_FAC_2023_1-1000733.PDF.exefalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  https://csp.withgoogle.com/csp/report-to/DriveUntrustedContentHttp/externalCasPol.exe, 0000000B.00000003.1385137269.0000000003AC6000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000003.1385837889.0000000003AD9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://crl.certum.pl/ctnca2.crl0lrFACTURA_FAC_2023_1-1000733.PDF.exefalse
                                                    high
                                                    http://repository.certum.pl/ctnca2.cer09rFACTURA_FAC_2023_1-1000733.PDF.exefalse
                                                      high
                                                      https://github.com/dotnet/runtimeBSJBrFACTURA_FAC_2023_1-1000733.PDF.exe, 00000000.00000002.1411917018.0000000000789000.00000004.00000001.01000000.00000003.sdmp, System.Reflection.TypeExtensions.dll.0.drfalse
                                                        high
                                                        https://drive.google.com/jCasPol.exe, 0000000B.00000002.1859898012.0000000003A1B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://checkip.dyndns.comCasPol.exe, 0000000B.00000002.1876903989.00000000342A5000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          http://creativecommons.org/ns#Noticebattery-level-90-charging-symbolic.svg.0.drfalse
                                                            high
                                                            http://creativecommons.org/ns#Reproductionbattery-level-90-charging-symbolic.svg.0.drfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCasPol.exe, 0000000B.00000002.1876903989.00000000341E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.certum.pl/CPS0rFACTURA_FAC_2023_1-1000733.PDF.exefalse
                                                                  high
                                                                  https://doc-0s-a8-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/mjejjps3CasPol.exe, 0000000B.00000003.1385137269.0000000003AC6000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1859898012.0000000003A90000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000003.1389269538.0000000003A90000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000003.1385837889.0000000003AD9000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 0000000B.00000002.1859898012.0000000003A78000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs
                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    132.226.8.169
                                                                    checkip.dyndns.comUnited States
                                                                    16989UTMEMUStrue
                                                                    142.250.181.238
                                                                    drive.google.comUnited States
                                                                    15169GOOGLEUSfalse
                                                                    142.250.185.193
                                                                    googlehosted.l.googleusercontent.comUnited States
                                                                    15169GOOGLEUSfalse
                                                                    Joe Sandbox Version:37.0.0 Beryl
                                                                    Analysis ID:830399
                                                                    Start date and time:2023-03-20 11:00:46 +01:00
                                                                    Joe Sandbox Product:CloudBasic
                                                                    Overall analysis duration:0h 17m 39s
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:light
                                                                    Cookbook file name:default.jbs
                                                                    Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                                                    Number of analysed new started processes analysed:19
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:0
                                                                    Technologies:
                                                                    • HCA enabled
                                                                    • EGA enabled
                                                                    • HDC enabled
                                                                    • AMSI enabled
                                                                    Analysis Mode:default
                                                                    Analysis stop reason:Timeout
                                                                    Sample file name:rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    Detection:MAL
                                                                    Classification:mal100.troj.spyw.evad.winEXE@5/21@3/3
                                                                    EGA Information:
                                                                    • Successful, ratio: 50%
                                                                    HDC Information:
                                                                    • Successful, ratio: 35.6% (good quality ratio 34.7%)
                                                                    • Quality average: 88%
                                                                    • Quality standard deviation: 22.2%
                                                                    HCA Information:
                                                                    • Successful, ratio: 89%
                                                                    • Number of executed functions: 0
                                                                    • Number of non-executed functions: 0
                                                                    Cookbook Comments:
                                                                    • Found application associated with file extension: .exe
                                                                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, svchost.exe
                                                                    • TCP Packets have been reduced to 100
                                                                    • Excluded IPs from analysis (whitelisted): 20.189.173.20
                                                                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, wdcpalt.microsoft.com, fs.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, settings-win.data.microsoft.com, umwatson.events.data.microsoft.com, wdcp.microsoft.com
                                                                    • Execution Graph export aborted for target CasPol.exe, PID 6576 because it is empty
                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                    • Report size getting too big, too many NtSetInformationFile calls found.
                                                                    No simulations
                                                                    No context
                                                                    No context
                                                                    No context
                                                                    No context
                                                                    No context
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):65536
                                                                    Entropy (8bit):1.2413907368074433
                                                                    Encrypted:false
                                                                    SSDEEP:192:9fE059v6x3mBUWSaX+AMWVM+Du76zfAIO8h:S0j6wBUWSaOaq+Du76zfAIO8h
                                                                    MD5:35DD3D5B04B74FA528100F3D0EFD2762
                                                                    SHA1:7152E07DBB8C0F5FBF780254D2E2E8C46B7B9F1F
                                                                    SHA-256:90E8785A4995B03B26F73D1A63BD0AADF591CAD0E8CBC0A35DA78088B3364F7B
                                                                    SHA-512:FC42405BD29FE2913BDB0A7D8C8F32CDBC6794F8B6E310A704A53AD96E95C4449F327EFF9146328001B51D4FB5DD97ED1CF0580545CAE3C43D8D3140007AC9BD
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.2.3.7.8.3.9.7.8.4.7.3.0.2.8.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.2.3.7.8.3.9.7.9.5.8.2.1.6.7.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.3.b.d.5.2.7.c.-.2.f.9.0.-.4.4.5.8.-.9.c.d.4.-.e.1.5.1.7.2.0.1.f.b.0.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.9.0.9.1.5.c.9.-.1.e.3.8.-.4.8.8.f.-.9.3.e.3.-.2.9.7.4.f.e.7.f.a.a.0.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.c.a.s.p.o.l...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.c.a.s.p.o.l...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.b.0.-.0.0.0.1.-.0.0.1.5.-.8.b.d.3.-.1.8.f.6.1.b.5.b.d.9.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.8.c.6.8.c.a.3.f.0.1.3.c.4.9.0.1.6.1.c.0.1.5.6.e.f.3.5.9.a.f.0.3.5.9.4.a.e.5.e.2.!.C.
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:Mini DuMP crash report, 14 streams, Mon Mar 20 11:06:18 2023, 0x1205a4 type
                                                                    Category:dropped
                                                                    Size (bytes):298062
                                                                    Entropy (8bit):3.5731501507227876
                                                                    Encrypted:false
                                                                    SSDEEP:3072:5YgOQBtas+vqyCftZYyC4uEq5mS2VLTgKQh85:5JHaseqyCDFC4Of2BTgh
                                                                    MD5:EBEB9263C8F7B88F1C962D0F6D174ED7
                                                                    SHA1:49718D4D2B825BFC51D546C3360190787F9CC0DF
                                                                    SHA-256:5A6B0099475067373495611C80EE30CD8FFF8CBCC41570CA6E3203FE371399D4
                                                                    SHA-512:F61A6D1019C9BE483002858790ABC909C8AC52821310B07ACA70F4790E8905F0DD8AD7AE08B13413D1353F3517D2E76532BBFA455F047C209CD2EE6759EF6EFC
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:MDMP..a..... .......*>.d.........................#..........."..,c..........T.......8...........T........... c...)...........,..........................................................................................bJ......8/......GenuineIntel...........T............>.d.............................0..................G.M.T. .S.t.a.n.d.a.r.d. .T.i.m.e...................................................G.M.T. .D.a.y.l.i.g.h.t. .T.i.m.e...................................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):8478
                                                                    Entropy (8bit):3.7135390864151505
                                                                    Encrypted:false
                                                                    SSDEEP:192:R9l7lZNipu6ISD1/6Y786zgmfZkCL9pr189b2Ssf0EkSm:R9lnNig6ISp6YA6zgmfWN2RfXQ
                                                                    MD5:FF404A19C5664B74EF66C62FD6BC2652
                                                                    SHA1:D287A995597C29843696562F0B0778734BBBB778
                                                                    SHA-256:90016E84D9557D7D3D5C53E9CFCAF383A41AE3D38640E8504B31FFA71B6AA4CD
                                                                    SHA-512:D7C9874B81D30F8C75CE136FF25F53443276F831FBB29DFA65914EDD8550B2D22E22D98182FE976F9CF2FB99EEBF4210BCA17B5F9284C9B3CE2D53989D8D0ABE
                                                                    Malicious:false
                                                                    Reputation:low
                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.2.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...1.1.6.5...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.1.6.5.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.5.7.6.<./.P.i.
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):4928
                                                                    Entropy (8bit):4.552958834584104
                                                                    Encrypted:false
                                                                    SSDEEP:48:cvIwwtl8zs+e702I7VFJ5WS2CfjkLs3rm8M4JdpPFOo/+q8vrpGvktd:uILfz7GySPfnJF/KIvktd
                                                                    MD5:78A0C11C168CDC2D5F74C2BEEA25637A
                                                                    SHA1:850126AB6E4157230C5FFC3A93CC94C3EDA0975A
                                                                    SHA-256:87920F454E599C8EE65E0F3F86BA5AB57473822CB516A507753D55CEA79412B9
                                                                    SHA-512:FD57DD4E26B1E020CD67AD7834870539DA41B2723377F846504D15ED2D326F14564513D23A596E0BFDD7848F6FDB61AAECF7F0345BF4AC56F4BE1A21556F9EA8
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19042" />.. <arg nm="vercsdbld" val="1165" />.. <arg nm="verqfe" val="1165" />.. <arg nm="csdbld" val="1165" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="242" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="222060348" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="
                                                                    Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    File Type:ASCII text, with very long lines (22842), with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):22842
                                                                    Entropy (8bit):2.691165226704503
                                                                    Encrypted:false
                                                                    SSDEEP:384:WHfXmxNkvIy6aQ+y57fZOKip2EuiP7Ecw8b:WHfWxNkvIy6axy57fAK82EuiP7Ecw8b
                                                                    MD5:27DC252D9E7B26BA6BF2C6D437997658
                                                                    SHA1:F81398F1F6FC24692BA8DF740CA2BF2AB73B27D6
                                                                    SHA-256:530F4F75B62CB7E1B585671E4F184AC9C667FC4335CDA4120D27136E6F4F0100
                                                                    SHA-512:473F5FED1BA3F62088A6ABE0D383EE9220DAABCB8524EFE8AC502B7503F4ACBA3DDAC69BBF1E046B5235C51129F2BF55F54C1D75285D7C5EE824C6DCA88D323D
                                                                    Malicious:false
                                                                    Preview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
                                                                    Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):32368
                                                                    Entropy (8bit):6.393948275188786
                                                                    Encrypted:false
                                                                    SSDEEP:384:yWweWqlXnYcLpSfX0lawccfNXLWrdzy+A2jc2EPLNtAf/uPHRN7AJ/AlGseC62c:EqlXYcgEAwcc17Wc+bj+PLHuMU/xjx2c
                                                                    MD5:F2A123183E106BB1CF19376A8079D171
                                                                    SHA1:2B96296BE92D5F2EF7C59A70858AF4CAABC99A9D
                                                                    SHA-256:896D4ED138C35ECF19AE432380096562872EAB103F7E352C15D214FD875B337A
                                                                    SHA-512:FCA6A89EFB16780A06CD25A55638882970F03E1535180A0E463AF9794184B04EB345CF29B12D4F261094E04A584E9225A7AD36A62631227451059F64A77B3C67
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....[............" .....P................................................................`...@......@............... ......................................<........Z..p$...p..........T...............................................................H............text....N.......P.................. ..`.data........`.......R..............@....reloc.......p.......X..............@..B............................................0.............................4...V.S._.V.E.R.S.I.O.N._.I.N.F.O...................y.........?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...Z.!...C.o.m.m.e.n.t.s...S.y.s.t.e.m...R.e.f.l.e.c.t.i.o.n...T.y.p.e.E.x.t.e.n.s.i.o.n.s.....L.....C.o.m.p.a.n.y.N.a.m.e.....M.i.c.r.o.s.o.f.t. .C.o.r.p.o.r.a.t.i.o.n...j.!...F.i.l.e.D.e.s.c.r.i.p.
                                                                    Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):14952
                                                                    Entropy (8bit):6.599053939997928
                                                                    Encrypted:false
                                                                    SSDEEP:192:mrlnC6xxk2R5Ws+Wql73WOL8/pCuPHnhWgN7aoWTF6lI+XqnajlkEv:6nbW2R5Ws+Wql7//uPHRN7SIImlqW
                                                                    MD5:EDA04E04EBC0EBF7F8BBF30C4DAE6DE3
                                                                    SHA1:7BC4D50E6EEC7F04A9272BFEE4E4DB6F278DBE63
                                                                    SHA-256:F3E55CB3ADFA93F563B09114D93062E680AB0864C220491458FBE151798B862F
                                                                    SHA-512:7027DA3404675596B71394B660E600DA12C0750895F624776362167869760555EE9990699FFC9E4407301FC9437B2F638E2734B8BDEF3C7054990FD5A9C86550
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."!..0.............^+... ........@.. ....................................`..................................+..K....@..................h$...`......T*..8............................................ ............... ..H............text...d.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................@+......H........ ......................P ......................................H>.s..X.\...3V...?G../..3q..l.L.....qKy6b..u"HO...JmYQ.....J..,.*S..".R..=1RY.....\?.&dM........@'J.j.:.'.A.../..........I.BSJB............v4.0.30319......`.......#~..........#Strings............#GUID...........#Blob......................3......................................3.........@...........Y...................`.................g...?.g.....g...y.g.....g.....g.....g...`.g...m.g.................
                                                                    Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):224632
                                                                    Entropy (8bit):7.3469254146259635
                                                                    Encrypted:false
                                                                    SSDEEP:3072:WQyWMNv4aM4IqtUHXAxcNxBrQeb8hlosuRUVGiyKrFyPlWUUVkUiXPQW/NhrsPPR:IWEbtUAixGhlo2I+hyEUJXVFm0XQ
                                                                    MD5:D2BE5DE19D44424CCB3F89510938FB53
                                                                    SHA1:B98E5FD30E1DE7437187787AFE48AD516223E01F
                                                                    SHA-256:0796783FC019D2AD4F01FF7AF14C24A9D3CFBAAB2BB9B44945231A46B6774D2B
                                                                    SHA-512:6E54E8C97F5A10921DAD011AAD9FBBA1D4D622CF78F4C977A366EF6C7C49B35552A6100BFAFCC4464B34B351CC200AD9EE12406DDE37FC96C2614BD24A5D0553
                                                                    Malicious:true
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\antiphthisical\Primar\Cunicular\Densimetric\Talestrmmene.Unr, Author: Joe Security
                                                                    Preview:...>........).......OOOO...............###.GG......BB..........T.......#....=...........{{.......++..........V........)._.@...............@@@@...```........*........................................................+..........f.........................7.......9......"..iii....?..88.F..........................P......).........Z...............$.....,......BBB...{{.UU....Q...........@@........''''''.....ttt..................qq........vv..............,............................?..00....W.BB...r.....55........8.9...--......{{.........E.......qqqqq..___.....H.....tt...........0.......WW.............X.55..y........................mm.....................~.D.....(.@@....{{{{{{{{...............oo........SSS..V...]]....33333....7..>.d.????......@@......j.8.TTTT..9......BB.........C..........II...)...........@@.....@@@..&&................z.......ppp.............4.z..........|........++...\\\...."....................).........v.......................2.l.hh..............l................9.......hhhh
                                                                    Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    File Type:SVG Scalable Vector Graphics image
                                                                    Category:dropped
                                                                    Size (bytes):6689
                                                                    Entropy (8bit):5.135211840989561
                                                                    Encrypted:false
                                                                    SSDEEP:192:VkjcMIy2+X2I2F2C2G2fH7y8cQaVB2nnuy1FQOcQaVv2q22L2k2s:mjcM7u8xaV8nnL1FQOxaVu6
                                                                    MD5:C96D0DD361AFC6B812BDDD390B765A26
                                                                    SHA1:71081F096719CAA70B9BAEF86FE642635D8E2765
                                                                    SHA-256:6690799E5FA3FB0DD6CCE4BAC5AA1607C8A6BB16507854A87520C7DE53052E1B
                                                                    SHA-512:7C73BC880A9401C64AB0571957B414180C1B94137C7BC870BA602979E7A990640A37991CB87A40BC7E5942A37FDA25EFC58C759C00F4344BA3D88B9AA64182DA
                                                                    Malicious:false
                                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?>.<svg. xmlns:dc="http://purl.org/dc/elements/1.1/". xmlns:cc="http://creativecommons.org/ns#". xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#". xmlns:svg="http://www.w3.org/2000/svg". xmlns="http://www.w3.org/2000/svg". width="16". version="1.1". style="enable-background:new". id="svg7384". height="16.000036">. <metadata. id="metadata90">. <rdf:RDF>. <cc:Work. rdf:about="">. <dc:format>image/svg+xml</dc:format>. <dc:type. rdf:resource="http://purl.org/dc/dcmitype/StillImage" />. <dc:title>Gnome Symbolic Icons</dc:title>. <cc:license. rdf:resource="http://creativecommons.org/licenses/by-sa/4.0/" />. </cc:Work>. <cc:License. rdf:about="http://creativecommons.org/licenses/by-sa/4.0/">. <cc:permits. rdf:resource="http://creativecommons.org/ns#Reproduction" />. <cc:permits. rdf:resource="htt
                                                                    Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                    Category:dropped
                                                                    Size (bytes):227
                                                                    Entropy (8bit):6.604776901672149
                                                                    Encrypted:false
                                                                    SSDEEP:6:6v/lhPysE9Xj1F/bkqdXujFErL4MImATQZu22F+p:6v/7kR7/bjd8Kgm2Q/2y
                                                                    MD5:7843C38CC42C6786B3373F166AF10172
                                                                    SHA1:BA0163109D9B641B1312230B3F62E1E10A61AA5E
                                                                    SHA-256:E3AF1293F8E8AB5C81300196AF55A7C15D5608291D46A2B86D4255910A7D0E59
                                                                    SHA-512:B1D3DF6A0A8CACD729CD9A2FD5AB0F74ED611270FA172CDBEB13D46FA71DD5CC5540A2FBFDB6C3004E652D317C8FAD4EC3AE437DF1C082B629870A33CC6BD34F
                                                                    Malicious:false
                                                                    Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...1..P......#.bae....^.^K/fek+........X...........gfw....\.D/..b...a.4..$........H#....o8...}..6.K.....Xc.$ ..'.1.2..vu.../O..>V......CD....<....w........IEND.B`.
                                                                    Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    File Type:SVG Scalable Vector Graphics image
                                                                    Category:dropped
                                                                    Size (bytes):1329
                                                                    Entropy (8bit):4.950241534342892
                                                                    Encrypted:false
                                                                    SSDEEP:24:t4Cp/YHyKbRAecFxVrGDT/Gfd8hTdyKbRAecFxVrGDT/bNxNxZrGQ:9YHNtAecFmDT/s8hdNtAecFmDT/j3YQ
                                                                    MD5:021A9F00A28C9D496E490AE951E8EF12
                                                                    SHA1:F8A6392065D07BAC72E138B0E47A24FFDCCEE74B
                                                                    SHA-256:B420561770B77FCB47F69B6198B34B11155535F8A2E907BC4A0998CE74AFD340
                                                                    SHA-512:7F4F2D904EA968BF68E35E0D7F1EAE9718234757D1989879996BFB49D9C447F67544CB0E1C441FD6539D58B5F2C6ACA7E9E0208738C235D9AF0C093511760212
                                                                    Malicious:false
                                                                    Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g fill="#474747"><path d="M1.018 7v2H14V7z" style="line-height:normal;font-variant-ligatures:normal;font-variant-position:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-feature-settings:normal;text-indent:0;text-align:start;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000;text-transform:none;text-orientation:mixed;shape-padding:0;isolation:auto;mix-blend-mode:normal;marker:none" color="#bebebe" font-weight="400" font-family="sans-serif" overflow="visible"/><path d="M11.99 4.99a1 1 0 00-.697 1.717L12.586 8l-1.293 1.293a1 1 0 101.414 1.414L15.414 8l-2.707-2.707a1 1 0 00-.717-.303z" style="line-height:normal;font-variant-ligatures:normal;font-variant-position:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-feature-settings:normal;text-indent:0;text-align:start;text-decoration-line:none;text-decorati
                                                                    Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    File Type:SVG Scalable Vector Graphics image
                                                                    Category:dropped
                                                                    Size (bytes):1155
                                                                    Entropy (8bit):5.154592341044034
                                                                    Encrypted:false
                                                                    SSDEEP:24:t4CpQyhEXQDWu4AeWrGMyRQJaPahrGDfJcghSvOqlIQX6e4AeWrGMyp:vhjDWu4Ae3M5wSgDDontqe4Ae3MO
                                                                    MD5:EFB3C780BC44B346B50B1F0DC6CF6D0F
                                                                    SHA1:472B0EDD1C4C3092BC7C4DF934ABE126885B1780
                                                                    SHA-256:990859D3B2C830E23EC276BF1D38A38EE1BA3D89BF04CB138107E4CDE31167B5
                                                                    SHA-512:5B9C96F146C6A065C89172D02BDE8020876DC9C78859AD2B8B9529C615215F88BA85C2789544F5C5A247C148BB52FE4B5FCA325E7EAC4826D31A0365A0B8BCBE
                                                                    Malicious:false
                                                                    Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g fill="#474747"><path d="M5 7c-.31 0-.615.09-.812.281L.594 11l3.656 3.719c.198.19.44.281.75.281h1v-1c0-.257-.13-.529-.312-.719L4.406 12H9s1 0 1-1c0 0 0-1-1-1H4.375l1.219-1.281C5.776 8.529 6 8.257 6 8V7z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:start;text-decoration-line:none;text-transform:none;marker:none" color="#000" font-weight="400" font-family="Sans" overflow="visible" opacity=".35"/><path d="M11 11h1.375l1.125 1.094L14.594 11H16v1.469l-1.094 1.062L16 14.594V16h-1.438L13.5 14.937 12.437 16H11v-1.406l1.063-1.063L11 12.47z" style="marker:none" color="#bebebe" overflow="visible"/><path d="M11 9c.31 0 .615-.09.813-.281L15.406 5 11.75 1.281C11.552 1.091 11.31 1 11 1h-1v1c0 .257.13.529.313.719L11.593 4H7c-.528-.007-1 .472-1 1s.472 1.007 1 1h4.625l-1.219 1.281c-.182.19-.406.462-.406.719v1z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:star
                                                                    Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                    Category:dropped
                                                                    Size (bytes):891
                                                                    Entropy (8bit):7.745720384539504
                                                                    Encrypted:false
                                                                    SSDEEP:24:d4qWCHdkXfUZEcO5MkIi416cOQSkye9V+:d4qnHd8MkIi4Dpb6
                                                                    MD5:5AF147D26AD399F83825377F04FD56A1
                                                                    SHA1:B378A498B0DB8114C794E21D533E80CEBE5DDE04
                                                                    SHA-256:6147A091847FCC9D9EDB22E655C4FC9DE6632C76D4252350400FA286F9791109
                                                                    SHA-512:EEC16DE49A4698FE4F03F841FBCF045FBBDC9D634EB73ED35DB544B6DB4BC0135CD8E1DF102FD1E8BDE9FC75380948B4C0459685EE2C21858D645B7973759EA6
                                                                    Malicious:false
                                                                    Preview:.PNG........IHDR................a...BIDATx.m.S.%9...$U.Fkl.y].m.6.m.F..5*g;k}.........P......~u................M......M.q......|OM>....:?>.X7.U..j.v..?...e....>.Jk.&.{.[=......t.d.....4.D...V....b..s.L.....Jg,..=V..@.n......Rqv...._....B.h.;l....A....r.ap....N...1./.O.2.u7#..../.....o..*..O...[..X,<. .....@v........t...H..Rf..C?q..8.HB.!{K..N.....t..5..1d.+......).......pL.5.R..=....jC"....t6.BA.)....xZ..d..^W~yU...ya......U/...VA.r.....r.U....[".D.).8..iO<..[.....t.e9S...K8!....K..&p..Y2l.....".P8:..v..0....zd..''....O?+^.. =..b....t..K../.......?.?5...c.[.f.nP.P.o....7..k..t.?P(..O>.H~...n..jh.'..]..SC.5M.....'.}.n..'...t..9..c*...Ki...t..1z..N.q...w.w..y..W...K7x.^..p....j...%..3.|.....x...G.|~..a.o.N.<.......wK...]..u..........`...(z.B!.?q.b..u..$(.#1..N...b.u...@h...|.w..g....}i....?~......1~...l..]h......IEND.B`.
                                                                    Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                    Category:dropped
                                                                    Size (bytes):225
                                                                    Entropy (8bit):6.596645802250635
                                                                    Encrypted:false
                                                                    SSDEEP:6:6v/lhPysi5NuhsPwRngRfPq/3+phjSfVsup:6v/7thstJACSNsc
                                                                    MD5:F894266AB6A933B2FDA751E6490C319A
                                                                    SHA1:2D2D3635198FEEFCB64D1D6B3CDCCDC4EA3DF4B0
                                                                    SHA-256:95F533585B4C61936C369557B3B7E397E56545A4C9DB9A5BDDD0E9ABB7A7F7E7
                                                                    SHA-512:977ED04753C3CB2B883D03A2A55001F6FCC8617DC3060B6C25AB7E5C691C3F76049E7DEADC7F6567AB7E8DC8492DE2874E8E632CF3EAD7B39ABC8CC98D331442
                                                                    Malicious:false
                                                                    Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8..1..@.E...".u.`..#.v.,r.[..1$..]B.@6.,,.e.....fwg...._)9........y..[n...t.$g..:...P....@k.q......W.. .PY.$z..x....t..(-~!.0$:P.t......`.......Ba..Y.....IEND.B`.
                                                                    Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                    Category:dropped
                                                                    Size (bytes):263
                                                                    Entropy (8bit):6.731374842054556
                                                                    Encrypted:false
                                                                    SSDEEP:6:6v/lhPysw9TXm0RZC/8xhbPgfdSwj4vw29OjuAO4+ZvYNVp:6v/7QVXm0a/8xhbPgfdSBvNYn2ZvYd
                                                                    MD5:003B524806C1CA654CAC6ED2EB883E1B
                                                                    SHA1:F6F6ACA125DC4DB3B33378404017B5EE7D21D334
                                                                    SHA-256:2899E53769FA741E2C0675A2C69D2C246A8F34601BEE58DD66B16261005962A9
                                                                    SHA-512:AA905997F9CE39F039E33C4CCA167C0137775D91B4929D918528BA00B92737C448EC46D91A4221644CCC00D1FCAA403AFF83F07276BAB6FD80D4B9E88E652F87
                                                                    Malicious:false
                                                                    Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...K..1.D......g.e=.x......[]....Y$J'..`.@.S)R.4.q.D.K....x..%..0>~.;}..^.X....Lt.f!..K.....D.&,.7,..BM..t@..}N..o.?.....Hv.J...(..r.. ..)L....&..dT<..1y...X..X...............q...p..p.....IEND.B`.
                                                                    Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                                                    Category:dropped
                                                                    Size (bytes):337
                                                                    Entropy (8bit):7.143668471552015
                                                                    Encrypted:false
                                                                    SSDEEP:6:6v/lhPWFmX9Ckymx8BZhCjO5QO6MsHqd+K/eBDQeU2oG9xqgjp:6v/7K0omx8yOqVtHH1U2oGR
                                                                    MD5:7FBFE5B0A7AD2A67AACFD8481F8DCA01
                                                                    SHA1:21BABB6B7EC4746835DB43DC6A69A4AF0EFECA2D
                                                                    SHA-256:0B4CD789E087F712F131FACCD754DC461774498DF3CA19B346D461D18A0AE622
                                                                    SHA-512:3A8F0D9653301F789A0588E848C40FFC92394461BF70A3421ABC85647F2C115948134FE9E161D055A11D200536356A15677D9C0E645346D27E122001F67FE22B
                                                                    Malicious:false
                                                                    Preview:.PNG........IHDR................a....IDATx..S.r.P..=7.cw.....W.m...=......V....I...K.?#@D.0G......R.rF..^$....p..b..f.<.T.z......... +..3#.v.K...$....pT.j.....[.......r..p....O.2.Y.T.,......==...9{/...T./....Qa...3%....5...xmkI.7.1..P,g.%y..J..#^.e..I(.%jzI..#../..49...*..?#..I. =~..E.,MN@........`...../...=.-...1....IEND.B`.
                                                                    Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):6144
                                                                    Entropy (8bit):4.496995234059773
                                                                    Encrypted:false
                                                                    SSDEEP:96:1IUNaXnnXyEIPtXvZhr5RwiULuxDtJ1+wolpE:1Ix3XyEwXvZh1RwnLUDtf+I
                                                                    MD5:E8B67A37FB41D54A7EDA453309D45D97
                                                                    SHA1:96BE9BF7A988D9CEA06150D57CD1DE19F1FEC19E
                                                                    SHA-256:2AD232BCCF4CA06CF13475AF87B510C5788AA790785FD50509BE483AFC0E0BCF
                                                                    SHA-512:20EFFAE18EEBB2DF90D3186A281FA9233A97998F226F7ADEAD0784FBC787FEEE419973962F8369D8822C1BBCDFB6E7948D9CA6086C9CF90190C8AB3EC97F4C38
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+.Y.o.7Eo.7Eo.7Eo.6EF.7E..jEf.7E;..Em.7E..3En.7ERicho.7E........PE..L.....uY...........!................`........ ...............................P......................................`$..E.... ..d............................@..$.................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):11776
                                                                    Entropy (8bit):5.659384359264642
                                                                    Encrypted:false
                                                                    SSDEEP:192:ex24sihno00Wfl97nH6BenXwWobpWBTtvShJ5omi7dJWjOlESlS:h8QIl972eXqlWBFSt273YOlEz
                                                                    MD5:8B3830B9DBF87F84DDD3B26645FED3A0
                                                                    SHA1:223BEF1F19E644A610A0877D01EADC9E28299509
                                                                    SHA-256:F004C568D305CD95EDBD704166FCD2849D395B595DFF814BCC2012693527AC37
                                                                    SHA-512:D13CFD98DB5CA8DC9C15723EEE0E7454975078A776BCE26247228BE4603A0217E166058EBADC68090AFE988862B7514CB8CB84DE13B3DE35737412A6F0A8AC03
                                                                    Malicious:false
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....uY...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..`....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:MS Windows registry file, NT/2000 or above
                                                                    Category:dropped
                                                                    Size (bytes):2097152
                                                                    Entropy (8bit):4.51255552598015
                                                                    Encrypted:false
                                                                    SSDEEP:12288:fgvUY6/eee9WwB84iTd+vXlnFbSwv+JnxQ7SLj732JlCGzz4OragmcnYJe:fa9WwB84iTd+vXlnFGMB4OragmcnYJe
                                                                    MD5:20E6A7C010975532E296EAFC1D773515
                                                                    SHA1:8812E42B1E2D5A5F1F50B10199474541DC543E2F
                                                                    SHA-256:A246C551735C3E61750F03DD6002D232027BB37C1358EF70C539A7B7238586AE
                                                                    SHA-512:BA5C5C6C87421158407A0BBCE253F89E861A439BB6A7AE244CAB077CAEB1C67BFA90C2B2714D6161B0CADF1BB5DFAB9C455015759B390F2894F33AD9B8064B02
                                                                    Malicious:false
                                                                    Preview:regf........5.#.^................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e......Q......P..#....Q......P..#........Q......P..#.rmtm.,...[.................................................................................................................................................................................................................................................................................................................................................0........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                    File Type:MS Windows registry file, NT/2000 or above
                                                                    Category:dropped
                                                                    Size (bytes):376832
                                                                    Entropy (8bit):2.6699792372502262
                                                                    Encrypted:false
                                                                    SSDEEP:3072:MS3DFIecejetVNqlWjai5sTBG2qDgebeOeF8DgebeOeDe3TKeme:MYSJevPqc6ns8c6nie3TKz
                                                                    MD5:0DB3DF965CE165E0BDB01BD97F87AB60
                                                                    SHA1:F551D0441A56D23A34BF1D0F854DB1AFFA2E0B7A
                                                                    SHA-256:EF041A829B69554F81F0EADAD45AB37647D3BD4D7FF365C485A37863B084DFB8
                                                                    SHA-512:7A3682900253113666604F1F95B96AA421E06A7319B617106450BB5E2791FA0A9E78F3E5D23FC923A922BB0B6F75620A54A4230ACAAC199728FAF9E3EEE9511E
                                                                    Malicious:false
                                                                    Preview:regf........5.#.^................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e......Q......P..#....Q......P..#........Q......P..#.rmtm.,...[.................................................................................................................................................................................................................................................................................................................................................0HvLE......................5d.-:.;....[Pu.................`....................... ... ...`... ..hbin................5.#.^...........nk,....S...............................................................&...{11517B7C-E79D-4e20-961B-75A811715ADD}......nk ..."..(......(...........@...............................*...N.......)...InventoryMiscellaneousMemorySlotArrayInfo....................mG.....nk .$4./T....... ...................................Z.......................Root........lh..
                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                    File Type:ASCII text, with CRLF, LF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):164
                                                                    Entropy (8bit):4.5750027080925975
                                                                    Encrypted:false
                                                                    SSDEEP:3:WNEDkFrA7fw3eqIusdHSdX7/fWmEdIOAlwV6EwqQLWFBaaafFa/Rv/naaaaqBcn:WsTbtyxkKO+dZWF7afFoRHRaaqBc
                                                                    MD5:8D14AB4128F9BFE3E4F5F9B160BBFFE7
                                                                    SHA1:7EA846DF04D4120A819DB47723C716BF2610E5CD
                                                                    SHA-256:91D7EA682DB129FD33DA04168DB3BFCA08EA8B6CB0533C559E0ADC0DA5BD56E8
                                                                    SHA-512:BF72FC0F59202B09E92961CE6C6CF21D3BBBB22AAA6B0A6B3FFBA2392362BF30A6B874A6CBBF6D11F06975CDDDBDB247053222D34D4F24055E50C0AFC9802E65
                                                                    Malicious:false
                                                                    Preview:.Unhandled Exception: System.Runtime.InteropServices.SEHException: External component has thrown an exception... at ????_.?;???.?????().. at ?????.?@???.Main().
                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                    Entropy (8bit):7.02530526585537
                                                                    TrID:
                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                    File name:rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    File size:431872
                                                                    MD5:a6ef5ed777ba7369c2bb28e46b198ba6
                                                                    SHA1:f707bc0343f41d95f57e776a9f85f6a2c5791aa7
                                                                    SHA256:878d710875b07ec61bef0b198ba67bf81ad0730a3a483d5762cd18e13fb4b525
                                                                    SHA512:3b0bbbf4199dfc669a75a8fb62cfa55423e2331358f43057219ee2a4099cc9c2b007d85b2cb1b6cd9c64d8d8421575690bed95556ca788cf13d6a53c96b3a2eb
                                                                    SSDEEP:6144:B6bAcJvkzKmPPzS58G93IuZCBabjYBNwmlJ8kUEe/oqBaH0NxsvLg/nkrIak7r8m:a7ubCHICiwkBySs/vBGwxs0vh7rXN
                                                                    TLSH:B194F161BFDBE857D02278B4A09ADE1E5E74EF14A249E307F3B139ACE5752513C1B202
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....uY.................d....:....
                                                                    Icon Hash:20c4f8f8e8f0f24c
                                                                    Entrypoint:0x403350
                                                                    Entrypoint Section:.text
                                                                    Digitally signed:true
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0x59759518 [Mon Jul 24 06:35:04 2017 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:4
                                                                    OS Version Minor:0
                                                                    File Version Major:4
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:4
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:b34f154ec913d2d2c435cbd644e91687
                                                                    Signature Valid:false
                                                                    Signature Issuer:E=Giordano@Agencies.ano, OU="Desidiose Haarvkstens ", O=Percussion, L=Mccomb, S=Mississippi, C=US
                                                                    Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                    Error Number:-2146762487
                                                                    Not Before, Not After
                                                                    • 09/01/2023 02:53:11 08/01/2026 02:53:11
                                                                    Subject Chain
                                                                    • E=Giordano@Agencies.ano, OU="Desidiose Haarvkstens ", O=Percussion, L=Mccomb, S=Mississippi, C=US
                                                                    Version:3
                                                                    Thumbprint MD5:B7600E9E947B9005922C17012BBF815F
                                                                    Thumbprint SHA-1:F61732487D62043541218B18386BFA3513D9C7CF
                                                                    Thumbprint SHA-256:C6510EBAF8763805CB5E0AAB32A94AEEFD9E39180B9A6D5F85E0272807031574
                                                                    Serial:1B9B07C3A599FD0DBF3CF80F5B8149857D2F3BA7
                                                                    Instruction
                                                                    sub esp, 000002D4h
                                                                    push ebx
                                                                    push esi
                                                                    push edi
                                                                    push 00000020h
                                                                    pop edi
                                                                    xor ebx, ebx
                                                                    push 00008001h
                                                                    mov dword ptr [esp+14h], ebx
                                                                    mov dword ptr [esp+10h], 0040A2E0h
                                                                    mov dword ptr [esp+1Ch], ebx
                                                                    call dword ptr [004080A8h]
                                                                    call dword ptr [004080A4h]
                                                                    and eax, BFFFFFFFh
                                                                    cmp ax, 00000006h
                                                                    mov dword ptr [007A8A2Ch], eax
                                                                    je 00007F7B10C23313h
                                                                    push ebx
                                                                    call 00007F7B10C265A9h
                                                                    cmp eax, ebx
                                                                    je 00007F7B10C23309h
                                                                    push 00000C00h
                                                                    call eax
                                                                    mov esi, 004082B0h
                                                                    push esi
                                                                    call 00007F7B10C26523h
                                                                    push esi
                                                                    call dword ptr [00408150h]
                                                                    lea esi, dword ptr [esi+eax+01h]
                                                                    cmp byte ptr [esi], 00000000h
                                                                    jne 00007F7B10C232ECh
                                                                    push 0000000Ah
                                                                    call 00007F7B10C2657Ch
                                                                    push 00000008h
                                                                    call 00007F7B10C26575h
                                                                    push 00000006h
                                                                    mov dword ptr [007A8A24h], eax
                                                                    call 00007F7B10C26569h
                                                                    cmp eax, ebx
                                                                    je 00007F7B10C23311h
                                                                    push 0000001Eh
                                                                    call eax
                                                                    test eax, eax
                                                                    je 00007F7B10C23309h
                                                                    or byte ptr [007A8A2Fh], 00000040h
                                                                    push ebp
                                                                    call dword ptr [00408044h]
                                                                    push ebx
                                                                    call dword ptr [004082A0h]
                                                                    mov dword ptr [007A8AF8h], eax
                                                                    push ebx
                                                                    lea eax, dword ptr [esp+34h]
                                                                    push 000002B4h
                                                                    push eax
                                                                    push ebx
                                                                    push 0079FEE0h
                                                                    call dword ptr [00408188h]
                                                                    push 0040A2C8h
                                                                    Programming Language:
                                                                    • [EXP] VC++ 6.0 SP5 build 8804
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d00000x28268.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x675000x2200.data
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    .text0x10000x63c80x6400False0.6766015625data6.504099201068482IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rdata0x80000x138e0x1400False0.4509765625data5.146454805063938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    .data0xa0000x39eb380x600unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .ndata0x3a90000x270000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .rsrc0x3d00000x282680x28400False0.3355129076086957data4.767250735975199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountry
                                                                    RT_ICON0x3d03100x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States
                                                                    RT_ICON0x3e0b380x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States
                                                                    RT_ICON0x3e9fe00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States
                                                                    RT_ICON0x3ef4680x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States
                                                                    RT_ICON0x3f36900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States
                                                                    RT_ICON0x3f5c380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States
                                                                    RT_ICON0x3f6ce00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States
                                                                    RT_ICON0x3f76680x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States
                                                                    RT_DIALOG0x3f7ad00x100dataEnglishUnited States
                                                                    RT_DIALOG0x3f7bd00xf8dataEnglishUnited States
                                                                    RT_DIALOG0x3f7cc80xa0dataEnglishUnited States
                                                                    RT_DIALOG0x3f7d680x60dataEnglishUnited States
                                                                    RT_GROUP_ICON0x3f7dc80x76dataEnglishUnited States
                                                                    RT_MANIFEST0x3f7e400x423XML 1.0 document, ASCII text, with very long lines (1059), with no line terminatorsEnglishUnited States
                                                                    DLLImport
                                                                    KERNEL32.dllSetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                                    USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                                                                    GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                    SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                                                                    ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                    COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                    ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                    Language of compilation systemCountry where language is spokenMap
                                                                    EnglishUnited States
                                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                    192.168.11.20132.226.8.16949801802039190 03/20/23-11:06:12.385242TCP2039190ET TROJAN 404/Snake/Matiex Keylogger Style External IP Check4980180192.168.11.20132.226.8.169
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Mar 20, 2023 11:06:09.958184958 CET49799443192.168.11.20142.250.181.238
                                                                    Mar 20, 2023 11:06:09.958285093 CET44349799142.250.181.238192.168.11.20
                                                                    Mar 20, 2023 11:06:09.958506107 CET49799443192.168.11.20142.250.181.238
                                                                    Mar 20, 2023 11:06:09.984272957 CET49799443192.168.11.20142.250.181.238
                                                                    Mar 20, 2023 11:06:09.984397888 CET44349799142.250.181.238192.168.11.20
                                                                    Mar 20, 2023 11:06:10.045090914 CET44349799142.250.181.238192.168.11.20
                                                                    Mar 20, 2023 11:06:10.045358896 CET49799443192.168.11.20142.250.181.238
                                                                    Mar 20, 2023 11:06:10.047038078 CET44349799142.250.181.238192.168.11.20
                                                                    Mar 20, 2023 11:06:10.047301054 CET49799443192.168.11.20142.250.181.238
                                                                    Mar 20, 2023 11:06:10.179662943 CET49799443192.168.11.20142.250.181.238
                                                                    Mar 20, 2023 11:06:10.179781914 CET44349799142.250.181.238192.168.11.20
                                                                    Mar 20, 2023 11:06:10.181099892 CET44349799142.250.181.238192.168.11.20
                                                                    Mar 20, 2023 11:06:10.181324959 CET49799443192.168.11.20142.250.181.238
                                                                    Mar 20, 2023 11:06:10.186059952 CET49799443192.168.11.20142.250.181.238
                                                                    Mar 20, 2023 11:06:10.228410006 CET44349799142.250.181.238192.168.11.20
                                                                    Mar 20, 2023 11:06:10.607240915 CET44349799142.250.181.238192.168.11.20
                                                                    Mar 20, 2023 11:06:10.607516050 CET49799443192.168.11.20142.250.181.238
                                                                    Mar 20, 2023 11:06:10.607625961 CET44349799142.250.181.238192.168.11.20
                                                                    Mar 20, 2023 11:06:10.607702971 CET44349799142.250.181.238192.168.11.20
                                                                    Mar 20, 2023 11:06:10.607809067 CET49799443192.168.11.20142.250.181.238
                                                                    Mar 20, 2023 11:06:10.607871056 CET49799443192.168.11.20142.250.181.238
                                                                    Mar 20, 2023 11:06:10.608670950 CET49799443192.168.11.20142.250.181.238
                                                                    Mar 20, 2023 11:06:10.608751059 CET44349799142.250.181.238192.168.11.20
                                                                    Mar 20, 2023 11:06:10.719572067 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.719638109 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.719877005 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.721764088 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.721791029 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.784081936 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.784686089 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.786132097 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.786376953 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.789782047 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.789808035 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.790358067 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.790604115 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.790844917 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.832494974 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.990123034 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.990459919 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.990459919 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.990549088 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.990758896 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.990837097 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.990875006 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.991152048 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.991658926 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.991830111 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.991830111 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.991880894 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.992635965 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.992887974 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.992938995 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.993135929 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.994764090 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.994924068 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.994976044 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.995349884 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.997493029 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.997740030 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.998691082 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.998888016 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.998948097 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.999191999 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.999248028 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.999530077 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.999576092 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.999773979 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:10.999778986 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:10.999816895 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:11.000003099 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:11.000003099 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:11.000072956 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:11.000294924 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:11.000356913 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:11.000560999 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:11.000607014 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:11.000802040 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:11.000852108 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:11.001095057 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:11.001132965 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:11.001480103 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:11.001739979 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:11.001935959 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:11.001996994 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:11.002201080 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:11.002250910 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:11.002553940 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:11.002605915 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:11.002842903 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:11.002895117 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:11.002944946 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:11.003164053 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:11.003164053 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:11.003472090 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:11.003706932 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:11.003756046 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:11.003926992 CET49800443192.168.11.20142.250.185.193
                                                                    Mar 20, 2023 11:06:11.003973961 CET44349800142.250.185.193192.168.11.20
                                                                    Mar 20, 2023 11:06:11.004225969 CET49800443192.168.11.20142.250.185.193
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Mar 20, 2023 11:06:09.935673952 CET5585153192.168.11.201.1.1.1
                                                                    Mar 20, 2023 11:06:09.945154905 CET53558511.1.1.1192.168.11.20
                                                                    Mar 20, 2023 11:06:10.684120893 CET5254753192.168.11.201.1.1.1
                                                                    Mar 20, 2023 11:06:10.718591928 CET53525471.1.1.1192.168.11.20
                                                                    Mar 20, 2023 11:06:12.076256037 CET6333153192.168.11.201.1.1.1
                                                                    Mar 20, 2023 11:06:12.085616112 CET53633311.1.1.1192.168.11.20
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Mar 20, 2023 11:06:09.935673952 CET192.168.11.201.1.1.10x6c07Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                    Mar 20, 2023 11:06:10.684120893 CET192.168.11.201.1.1.10x372dStandard query (0)doc-0s-a8-docs.googleusercontent.comA (IP address)IN (0x0001)false
                                                                    Mar 20, 2023 11:06:12.076256037 CET192.168.11.201.1.1.10x58b7Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Mar 20, 2023 11:06:09.945154905 CET1.1.1.1192.168.11.200x6c07No error (0)drive.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                                    Mar 20, 2023 11:06:10.718591928 CET1.1.1.1192.168.11.200x372dNo error (0)doc-0s-a8-docs.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)false
                                                                    Mar 20, 2023 11:06:10.718591928 CET1.1.1.1192.168.11.200x372dNo error (0)googlehosted.l.googleusercontent.com142.250.185.193A (IP address)IN (0x0001)false
                                                                    Mar 20, 2023 11:06:12.085616112 CET1.1.1.1192.168.11.200x58b7No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                    Mar 20, 2023 11:06:12.085616112 CET1.1.1.1192.168.11.200x58b7No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                    Mar 20, 2023 11:06:12.085616112 CET1.1.1.1192.168.11.200x58b7No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                    Mar 20, 2023 11:06:12.085616112 CET1.1.1.1192.168.11.200x58b7No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                    Mar 20, 2023 11:06:12.085616112 CET1.1.1.1192.168.11.200x58b7No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                    Mar 20, 2023 11:06:12.085616112 CET1.1.1.1192.168.11.200x58b7No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                    • drive.google.com
                                                                    • doc-0s-a8-docs.googleusercontent.com
                                                                    • checkip.dyndns.org

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:11:05:09
                                                                    Start date:20/03/2023
                                                                    Path:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    Imagebase:0x400000
                                                                    File size:431872 bytes
                                                                    MD5 hash:A6EF5ED777BA7369C2BB28E46B198BA6
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 00000000.00000002.1415606595.00000000048B0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1415606595.0000000005E20000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:low

                                                                    Target ID:11
                                                                    Start time:11:06:03
                                                                    Start date:20/03/2023
                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Users\user\Desktop\rFACTURA_FAC_2023_1-1000733.PDF.exe
                                                                    Imagebase:0xbe0000
                                                                    File size:108664 bytes
                                                                    MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_GuLoader_5, Description: Yara detected GuLoader, Source: 0000000B.00000002.1786467995.0000000000FC0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:high

                                                                    Target ID:12
                                                                    Start time:11:06:03
                                                                    Start date:20/03/2023
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff64d8d0000
                                                                    File size:875008 bytes
                                                                    MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high

                                                                    Target ID:15
                                                                    Start time:11:06:18
                                                                    Start date:20/03/2023
                                                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6576 -s 2500
                                                                    Imagebase:0xab0000
                                                                    File size:482640 bytes
                                                                    MD5 hash:40A149513D721F096DDF50C04DA2F01F
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Reputation:moderate

                                                                    No disassembly