Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rJUSTIFICANTEDEPAGO.exe

Overview

General Information

Sample Name:rJUSTIFICANTEDEPAGO.exe
Analysis ID:830400
MD5:e542cf9ce8a67a5b681cc9b0004e0b10
SHA1:40161158f7cab76c57b4d95798c74ebc7d612cfe
SHA256:4e78f6957f4c8c0f56a9b49e139342b1df7b1dc05518d96e776aa687a80f8c58
Infos:

Detection

AgentTesla, GuLoader
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected GuLoader
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
PE file does not import any functions
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Binary contains a suspicious time stamp
PE / OLE file has an invalid certificate
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64native
  • rJUSTIFICANTEDEPAGO.exe (PID: 4708 cmdline: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe MD5: E542CF9CE8A67A5B681CC9B0004E0B10)
    • CasPol.exe (PID: 4160 cmdline: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe MD5: 914F728C04D3EDDD5FBA59420E74E56B)
      • conhost.exe (PID: 8068 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.6893759617.00000000360C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000007.00000002.6893759617.00000000360C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.2804076292.0000000005376000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: CasPol.exe PID: 4160JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: CasPol.exe PID: 4160JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: rJUSTIFICANTEDEPAGO.exeVirustotal: Detection: 21%Perma Link
            Source: rJUSTIFICANTEDEPAGO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Replyingly\Avnbgen\SpisekamrenesJump to behavior
            Source: unknownHTTPS traffic detected: 172.217.16.206:443 -> 192.168.11.20:49816 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.11.20:49817 version: TLS 1.2
            Source: rJUSTIFICANTEDEPAGO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 2_2_0040596D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 2_2_004065A2 FindFirstFileW,FindClose,
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 2_2_00402862 FindFirstFileW,
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Ll5Auv3nDnZ4O0Qt2f2ZcFUknFi4BgKW HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/npt87m3l1utm86tkghdjh82fk6qcfges/1679307750000/00651307112604445902/*/1Ll5Auv3nDnZ4O0Qt2f2ZcFUknFi4BgKW?e=download&uuid=ea605c4e-1574-48ab-a781-ae85f09da2da HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: doc-0s-98-docs.googleusercontent.comConnection: Keep-Alive
            Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49817 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49817
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: CasPol.exe, 00000007.00000003.2773592501.0000000005510000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: CasPol.exe, 00000007.00000003.2773592501.0000000005510000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: rJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2801043131.000000000040A000.00000004.00000001.01000000.00000004.sdmp, rJUSTIFICANTEDEPAGO.exe, 00000002.00000000.1680795427.000000000040A000.00000008.00000001.01000000.00000004.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: CasPol.exe, 00000007.00000002.6872352349.0000000005508000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://doc-0s-98-docs.googleusercontent.com/%%doc-0s-98-docs.googleusercontent.com
            Source: CasPol.exe, 00000007.00000003.2773592501.0000000005510000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.6872352349.00000000054F5000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.6872352349.000000000554E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://doc-0s-98-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/npt87m3l
            Source: CasPol.exe, 00000007.00000002.6888996138.0000000034FA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1Ll5Auv3nDnZ4O0Qt2f2ZcFUknFi4BgKW
            Source: rJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2801043131.0000000000789000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: https://github.com/dotnet/runtime
            Source: rJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2801043131.0000000000789000.00000004.00000001.01000000.00000004.sdmpString found in binary or memory: https://github.com/dotnet/runtimeBSJB
            Source: unknownDNS traffic detected: queries for: drive.google.com
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Ll5Auv3nDnZ4O0Qt2f2ZcFUknFi4BgKW HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/npt87m3l1utm86tkghdjh82fk6qcfges/1679307750000/00651307112604445902/*/1Ll5Auv3nDnZ4O0Qt2f2ZcFUknFi4BgKW?e=download&uuid=ea605c4e-1574-48ab-a781-ae85f09da2da HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoCache-Control: no-cacheHost: doc-0s-98-docs.googleusercontent.comConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 172.217.16.206:443 -> 192.168.11.20:49816 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.186.33:443 -> 192.168.11.20:49817 version: TLS 1.2
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 2_2_00405402 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
            Source: rJUSTIFICANTEDEPAGO.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 2_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 2_2_00404C3F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 7_2_360A4140
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 7_2_360A4D58
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 7_2_360A4488
            Source: System.Reflection.TypeExtensions.dll.2.drStatic PE information: No import functions for PE file found
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeSection loaded: edgegdi.dll
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: edgegdi.dll
            Source: rJUSTIFICANTEDEPAGO.exeStatic PE information: invalid certificate
            Source: rJUSTIFICANTEDEPAGO.exeVirustotal: Detection: 21%
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeFile read: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeJump to behavior
            Source: rJUSTIFICANTEDEPAGO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 2_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeFile created: C:\Users\user\AppData\Local\Temp\nsz625B.tmpJump to behavior
            Source: classification engineClassification label: mal96.troj.spyw.evad.winEXE@4/14@2/2
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 2_2_004020FE LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 2_2_004046C3 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,LdrInitializeThunk,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8068:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8068:304:WilStaging_02
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Replyingly\Avnbgen\SpisekamrenesJump to behavior
            Source: rJUSTIFICANTEDEPAGO.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000002.00000002.2804076292.0000000005376000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 2_2_10002DE0 push eax; ret
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 2_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
            Source: System.Reflection.Primitives.dll.2.drStatic PE information: 0xE40AD0DE [Wed Mar 28 09:54:38 2091 UTC]
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeFile created: C:\Users\user\AppData\Local\Temp\nsz62F8.tmp\AdvSplash.dllJump to dropped file
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeFile created: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Rntgenstraaler\Overholde\Wingdings\System.Reflection.TypeExtensions.dllJump to dropped file
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeFile created: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nonteachable\Bekmpelsesforanstaltninger\Carcinoid2\Efterplaprer\System.Reflection.Primitives.dllJump to dropped file
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeFile created: C:\Users\user\AppData\Local\Temp\nsz62F8.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeFile opened: C:\Program Files\qga\qga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Program Files\qga\qga.exe
            Source: rJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2802808162.0000000000858000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Source: rJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2802808162.0000000000858000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Rntgenstraaler\Overholde\Wingdings\System.Reflection.TypeExtensions.dllJump to dropped file
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nonteachable\Bekmpelsesforanstaltninger\Carcinoid2\Efterplaprer\System.Reflection.Primitives.dllJump to dropped file
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWindow / User API: threadDelayed 1885
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 2_2_0040596D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 2_2_004065A2 FindFirstFileW,FindClose,
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 2_2_00402862 FindFirstFileW,
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeSystem information queried: ModuleInformation
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeAPI call chain: ExitProcess graph end node
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeAPI call chain: ExitProcess graph end node
            Source: rJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2886151117.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.6876893530.00000000070F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
            Source: rJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2886151117.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.6876893530.00000000070F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
            Source: CasPol.exe, 00000007.00000002.6876893530.00000000070F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
            Source: rJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2886151117.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.6876893530.00000000070F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
            Source: rJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2886151117.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.6876893530.00000000070F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
            Source: rJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2886151117.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.6876893530.00000000070F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
            Source: CasPol.exe, 00000007.00000002.6876893530.00000000070F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
            Source: CasPol.exe, 00000007.00000002.6872352349.00000000054F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: rJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2802808162.0000000000858000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: rJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2886151117.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.6876893530.00000000070F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
            Source: rJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2886151117.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.6876893530.00000000070F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
            Source: rJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2886151117.0000000010059000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.6876893530.00000000070F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
            Source: rJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2802808162.0000000000858000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exe
            Source: CasPol.exe, 00000007.00000002.6876893530.00000000070F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 2_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 2_2_00401E43 LdrInitializeThunk,ShowWindow,EnableWindow,
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: F00000
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
            Source: C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exeCode function: 2_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000007.00000002.6893759617.00000000360C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 4160, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: Yara matchFile source: 00000007.00000002.6893759617.00000000360C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 4160, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000007.00000002.6893759617.00000000360C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 4160, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts211
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Ingress Tool Transfer
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
            System Shutdown/Reboot
            Default Accounts1
            Native API
            1
            Windows Service
            1
            Access Token Manipulation
            1
            Obfuscated Files or Information
            1
            Credentials in Registry
            117
            System Information Discovery
            Remote Desktop Protocol1
            Data from Local System
            Exfiltration Over Bluetooth11
            Encrypted Channel
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)1
            Windows Service
            1
            Timestomp
            Security Account Manager311
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            Automated Exfiltration2
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)111
            Process Injection
            1
            DLL Side-Loading
            NTDS21
            Virtualization/Sandbox Evasion
            Distributed Component Object Model1
            Clipboard Data
            Scheduled Transfer13
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script21
            Virtualization/Sandbox Evasion
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common1
            Access Token Manipulation
            Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items111
            Process Injection
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 830400 Sample: rJUSTIFICANTEDEPAGO.exe Startdate: 20/03/2023 Architecture: WINDOWS Score: 96 26 googlehosted.l.googleusercontent.com 2->26 28 drive.google.com 2->28 30 doc-0s-98-docs.googleusercontent.com 2->30 36 Multi AV Scanner detection for submitted file 2->36 38 Yara detected GuLoader 2->38 40 Yara detected AgentTesla 2->40 42 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 2->42 8 rJUSTIFICANTEDEPAGO.exe 5 52 2->8         started        signatures3 process4 file5 18 C:\Users\user\AppData\Local\...\System.dll, PE32 8->18 dropped 20 C:\Users\user\AppData\Local\...\AdvSplash.dll, PE32 8->20 dropped 22 C:\...\System.Reflection.TypeExtensions.dll, PE32+ 8->22 dropped 24 C:\Users\...\System.Reflection.Primitives.dll, PE32 8->24 dropped 44 Writes to foreign memory regions 8->44 46 Tries to detect Any.run 8->46 12 CasPol.exe 11 8->12         started        signatures6 process7 dnsIp8 32 googlehosted.l.googleusercontent.com 142.250.186.33, 443, 49817 GOOGLEUS United States 12->32 34 drive.google.com 172.217.16.206, 443, 49816 GOOGLEUS United States 12->34 48 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 12->48 50 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 12->50 52 Tries to steal Mail credentials (via file / registry access) 12->52 54 3 other signatures 12->54 16 conhost.exe 12->16         started        signatures9 process10

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            rJUSTIFICANTEDEPAGO.exe22%VirustotalBrowse
            rJUSTIFICANTEDEPAGO.exe8%ReversingLabsWin32.Trojan.Generic
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nonteachable\Bekmpelsesforanstaltninger\Carcinoid2\Efterplaprer\System.Reflection.Primitives.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Nonteachable\Bekmpelsesforanstaltninger\Carcinoid2\Efterplaprer\System.Reflection.Primitives.dll0%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Rntgenstraaler\Overholde\Wingdings\System.Reflection.TypeExtensions.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\Musicalises34\Coleman\Biarcuated\Rntgenstraaler\Overholde\Wingdings\System.Reflection.TypeExtensions.dll0%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\nsz62F8.tmp\AdvSplash.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\nsz62F8.tmp\AdvSplash.dll3%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\nsz62F8.tmp\System.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\nsz62F8.tmp\System.dll1%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            drive.google.com
            172.217.16.206
            truefalse
              high
              googlehosted.l.googleusercontent.com
              142.250.186.33
              truefalse
                high
                doc-0s-98-docs.googleusercontent.com
                unknown
                unknownfalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  https://doc-0s-98-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/npt87m3l1utm86tkghdjh82fk6qcfges/1679307750000/00651307112604445902/*/1Ll5Auv3nDnZ4O0Qt2f2ZcFUknFi4BgKW?e=download&uuid=ea605c4e-1574-48ab-a781-ae85f09da2dafalse
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://github.com/dotnet/runtimeBSJBrJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2801043131.0000000000789000.00000004.00000001.01000000.00000004.sdmpfalse
                      high
                      http://nsis.sf.net/NSIS_ErrorErrorrJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2801043131.000000000040A000.00000004.00000001.01000000.00000004.sdmp, rJUSTIFICANTEDEPAGO.exe, 00000002.00000000.1680795427.000000000040A000.00000008.00000001.01000000.00000004.sdmpfalse
                        high
                        https://doc-0s-98-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/npt87m3lCasPol.exe, 00000007.00000003.2773592501.0000000005510000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.6872352349.00000000054F5000.00000004.00000020.00020000.00000000.sdmp, CasPol.exe, 00000007.00000002.6872352349.000000000554E000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://doc-0s-98-docs.googleusercontent.com/%%doc-0s-98-docs.googleusercontent.comCasPol.exe, 00000007.00000002.6872352349.0000000005508000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://github.com/dotnet/runtimerJUSTIFICANTEDEPAGO.exe, 00000002.00000002.2801043131.0000000000789000.00000004.00000001.01000000.00000004.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              172.217.16.206
                              drive.google.comUnited States
                              15169GOOGLEUSfalse
                              142.250.186.33
                              googlehosted.l.googleusercontent.comUnited States
                              15169GOOGLEUSfalse
                              Joe Sandbox Version:37.0.0 Beryl
                              Analysis ID:830400
                              Start date and time:2023-03-20 11:19:28 +01:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 14m 59s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                              Number of analysed new started processes analysed:17
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample file name:rJUSTIFICANTEDEPAGO.exe
                              Detection:MAL
                              Classification:mal96.troj.spyw.evad.winEXE@4/14@2/2
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:
                              • Successful, ratio: 85.9% (good quality ratio 84.4%)
                              • Quality average: 87%
                              • Quality standard deviation: 21.9%
                              HCA Information:
                              • Successful, ratio: 89%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                              • Exclude process from analysis (whitelisted): dllhost.exe, audiodg.exe, UserOOBEBroker.exe, RuntimeBroker.exe, ShellExperienceHost.exe, WMIADAP.exe, backgroundTaskHost.exe, MoUsoCoreWorker.exe, svchost.exe, UsoClient.exe
                              • TCP Packets have been reduced to 100
                              • Excluded domains from analysis (whitelisted): www.bing.com, wdcpalt.microsoft.com, client.wns.windows.com, login.live.com, ctldl.windowsupdate.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              • Report size getting too big, too many NtSetInformationFile calls found.
                              No simulations
                              No context
                              No context
                              No context
                              No context
                              No context
                              Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                              File Type:SVG Scalable Vector Graphics image
                              Category:dropped
                              Size (bytes):6689
                              Entropy (8bit):5.135211840989561
                              Encrypted:false
                              SSDEEP:192:VkjcMIy2+X2I2F2C2G2fH7y8cQaVB2nnuy1FQOcQaVv2q22L2k2s:mjcM7u8xaV8nnL1FQOxaVu6
                              MD5:C96D0DD361AFC6B812BDDD390B765A26
                              SHA1:71081F096719CAA70B9BAEF86FE642635D8E2765
                              SHA-256:6690799E5FA3FB0DD6CCE4BAC5AA1607C8A6BB16507854A87520C7DE53052E1B
                              SHA-512:7C73BC880A9401C64AB0571957B414180C1B94137C7BC870BA602979E7A990640A37991CB87A40BC7E5942A37FDA25EFC58C759C00F4344BA3D88B9AA64182DA
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="no"?>.<svg. xmlns:dc="http://purl.org/dc/elements/1.1/". xmlns:cc="http://creativecommons.org/ns#". xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#". xmlns:svg="http://www.w3.org/2000/svg". xmlns="http://www.w3.org/2000/svg". width="16". version="1.1". style="enable-background:new". id="svg7384". height="16.000036">. <metadata. id="metadata90">. <rdf:RDF>. <cc:Work. rdf:about="">. <dc:format>image/svg+xml</dc:format>. <dc:type. rdf:resource="http://purl.org/dc/dcmitype/StillImage" />. <dc:title>Gnome Symbolic Icons</dc:title>. <cc:license. rdf:resource="http://creativecommons.org/licenses/by-sa/4.0/" />. </cc:Work>. <cc:License. rdf:about="http://creativecommons.org/licenses/by-sa/4.0/">. <cc:permits. rdf:resource="http://creativecommons.org/ns#Reproduction" />. <cc:permits. rdf:resource="htt
                              Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                              File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                              Category:dropped
                              Size (bytes):227
                              Entropy (8bit):6.604776901672149
                              Encrypted:false
                              SSDEEP:6:6v/lhPysE9Xj1F/bkqdXujFErL4MImATQZu22F+p:6v/7kR7/bjd8Kgm2Q/2y
                              MD5:7843C38CC42C6786B3373F166AF10172
                              SHA1:BA0163109D9B641B1312230B3F62E1E10A61AA5E
                              SHA-256:E3AF1293F8E8AB5C81300196AF55A7C15D5608291D46A2B86D4255910A7D0E59
                              SHA-512:B1D3DF6A0A8CACD729CD9A2FD5AB0F74ED611270FA172CDBEB13D46FA71DD5CC5540A2FBFDB6C3004E652D317C8FAD4EC3AE437DF1C082B629870A33CC6BD34F
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...1..P......#.bae....^.^K/fek+........X...........gfw....\.D/..b...a.4..$........H#....o8...}..6.K.....Xc.$ ..'.1.2..vu.../O..>V......CD....<....w........IEND.B`.
                              Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                              File Type:SVG Scalable Vector Graphics image
                              Category:dropped
                              Size (bytes):1329
                              Entropy (8bit):4.950241534342892
                              Encrypted:false
                              SSDEEP:24:t4Cp/YHyKbRAecFxVrGDT/Gfd8hTdyKbRAecFxVrGDT/bNxNxZrGQ:9YHNtAecFmDT/s8hdNtAecFmDT/j3YQ
                              MD5:021A9F00A28C9D496E490AE951E8EF12
                              SHA1:F8A6392065D07BAC72E138B0E47A24FFDCCEE74B
                              SHA-256:B420561770B77FCB47F69B6198B34B11155535F8A2E907BC4A0998CE74AFD340
                              SHA-512:7F4F2D904EA968BF68E35E0D7F1EAE9718234757D1989879996BFB49D9C447F67544CB0E1C441FD6539D58B5F2C6ACA7E9E0208738C235D9AF0C093511760212
                              Malicious:false
                              Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g fill="#474747"><path d="M1.018 7v2H14V7z" style="line-height:normal;font-variant-ligatures:normal;font-variant-position:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-feature-settings:normal;text-indent:0;text-align:start;text-decoration-line:none;text-decoration-style:solid;text-decoration-color:#000;text-transform:none;text-orientation:mixed;shape-padding:0;isolation:auto;mix-blend-mode:normal;marker:none" color="#bebebe" font-weight="400" font-family="sans-serif" overflow="visible"/><path d="M11.99 4.99a1 1 0 00-.697 1.717L12.586 8l-1.293 1.293a1 1 0 101.414 1.414L15.414 8l-2.707-2.707a1 1 0 00-.717-.303z" style="line-height:normal;font-variant-ligatures:normal;font-variant-position:normal;font-variant-caps:normal;font-variant-numeric:normal;font-variant-alternates:normal;font-feature-settings:normal;text-indent:0;text-align:start;text-decoration-line:none;text-decorati
                              Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                              File Type:SVG Scalable Vector Graphics image
                              Category:dropped
                              Size (bytes):1155
                              Entropy (8bit):5.154592341044034
                              Encrypted:false
                              SSDEEP:24:t4CpQyhEXQDWu4AeWrGMyRQJaPahrGDfJcghSvOqlIQX6e4AeWrGMyp:vhjDWu4Ae3M5wSgDDontqe4Ae3MO
                              MD5:EFB3C780BC44B346B50B1F0DC6CF6D0F
                              SHA1:472B0EDD1C4C3092BC7C4DF934ABE126885B1780
                              SHA-256:990859D3B2C830E23EC276BF1D38A38EE1BA3D89BF04CB138107E4CDE31167B5
                              SHA-512:5B9C96F146C6A065C89172D02BDE8020876DC9C78859AD2B8B9529C615215F88BA85C2789544F5C5A247C148BB52FE4B5FCA325E7EAC4826D31A0365A0B8BCBE
                              Malicious:false
                              Preview:<svg xmlns="http://www.w3.org/2000/svg" width="16" height="16"><g fill="#474747"><path d="M5 7c-.31 0-.615.09-.812.281L.594 11l3.656 3.719c.198.19.44.281.75.281h1v-1c0-.257-.13-.529-.312-.719L4.406 12H9s1 0 1-1c0 0 0-1-1-1H4.375l1.219-1.281C5.776 8.529 6 8.257 6 8V7z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:start;text-decoration-line:none;text-transform:none;marker:none" color="#000" font-weight="400" font-family="Sans" overflow="visible" opacity=".35"/><path d="M11 11h1.375l1.125 1.094L14.594 11H16v1.469l-1.094 1.062L16 14.594V16h-1.438L13.5 14.937 12.437 16H11v-1.406l1.063-1.063L11 12.47z" style="marker:none" color="#bebebe" overflow="visible"/><path d="M11 9c.31 0 .615-.09.813-.281L15.406 5 11.75 1.281C11.552 1.091 11.31 1 11 1h-1v1c0 .257.13.529.313.719L11.593 4H7c-.528-.007-1 .472-1 1s.472 1.007 1 1h4.625l-1.219 1.281c-.182.19-.406.462-.406.719v1z" style="line-height:normal;-inkscape-font-specification:Sans;text-indent:0;text-align:star
                              Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                              File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                              Category:dropped
                              Size (bytes):891
                              Entropy (8bit):7.745720384539504
                              Encrypted:false
                              SSDEEP:24:d4qWCHdkXfUZEcO5MkIi416cOQSkye9V+:d4qnHd8MkIi4Dpb6
                              MD5:5AF147D26AD399F83825377F04FD56A1
                              SHA1:B378A498B0DB8114C794E21D533E80CEBE5DDE04
                              SHA-256:6147A091847FCC9D9EDB22E655C4FC9DE6632C76D4252350400FA286F9791109
                              SHA-512:EEC16DE49A4698FE4F03F841FBCF045FBBDC9D634EB73ED35DB544B6DB4BC0135CD8E1DF102FD1E8BDE9FC75380948B4C0459685EE2C21858D645B7973759EA6
                              Malicious:false
                              Preview:.PNG........IHDR................a...BIDATx.m.S.%9...$U.Fkl.y].m.6.m.F..5*g;k}.........P......~u................M......M.q......|OM>....:?>.X7.U..j.v..?...e....>.Jk.&.{.[=......t.d.....4.D...V....b..s.L.....Jg,..=V..@.n......Rqv...._....B.h.;l....A....r.ap....N...1./.O.2.u7#..../.....o..*..O...[..X,<. .....@v........t...H..Rf..C?q..8.HB.!{K..N.....t..5..1d.+......).......pL.5.R..=....jC"....t6.BA.)....xZ..d..^W~yU...ya......U/...VA.r.....r.U....[".D.).8..iO<..[.....t.e9S...K8!....K..&p..Y2l.....".P8:..v..0....zd..''....O?+^.. =..b....t..K../.......?.?5...c.[.f.nP.P.o....7..k..t.?P(..O>.H~...n..jh.'..]..SC.5M.....'.}.n..'...t..9..c*...Ki...t..1z..N.q...w.w..y..W...K7x.^..p....j...%..3.|.....x...G.|~..a.o.N.<.......wK...]..u..........`...(z.B!.?q.b..u..$(.#1..N...b.u...@h...|.w..g....}i....?~......1~...l..]h......IEND.B`.
                              Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                              File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):14952
                              Entropy (8bit):6.599053939997928
                              Encrypted:false
                              SSDEEP:192:mrlnC6xxk2R5Ws+Wql73WOL8/pCuPHnhWgN7aoWTF6lI+XqnajlkEv:6nbW2R5Ws+Wql7//uPHRN7SIImlqW
                              MD5:EDA04E04EBC0EBF7F8BBF30C4DAE6DE3
                              SHA1:7BC4D50E6EEC7F04A9272BFEE4E4DB6F278DBE63
                              SHA-256:F3E55CB3ADFA93F563B09114D93062E680AB0864C220491458FBE151798B862F
                              SHA-512:7027DA3404675596B71394B660E600DA12C0750895F624776362167869760555EE9990699FFC9E4407301FC9437B2F638E2734B8BDEF3C7054990FD5A9C86550
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              • Antivirus: Virustotal, Detection: 0%, Browse
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."!..0.............^+... ........@.. ....................................`..................................+..K....@..................h$...`......T*..8............................................ ............... ..H............text...d.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................@+......H........ ......................P ......................................H>.s..X.\...3V...?G../..3q..l.L.....qKy6b..u"HO...JmYQ.....J..,.*S..".R..=1RY.....\?.&dM........@'J.j.:.'.A.../..........I.BSJB............v4.0.30319......`.......#~..........#Strings............#GUID...........#Blob......................3......................................3.........@...........Y...................`.................g...?.g.....g...y.g.....g.....g.....g...`.g...m.g.................
                              Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                              File Type:ASCII text, with very long lines (36518), with no line terminators
                              Category:dropped
                              Size (bytes):36518
                              Entropy (8bit):2.6830744752603626
                              Encrypted:false
                              SSDEEP:768:xeK/i8OrT1EEEN7NmGmBsb7IxbJhOANjoIi55GP++IssSCDu/2qnSsUHZll:xeKv2n1OAE/EP9Ka/2lHzl
                              MD5:AE738FA62A77E7AC245E166294F62CF4
                              SHA1:EB347C2E02E3FBB39D316CEE73ED4B72DCA34C41
                              SHA-256:4513093A8A81A33B2704FA5C8D168172A4A561188992D2AE1C93E1AF0611C076
                              SHA-512:5B1241A8702E25C84D64CD7B6790852B46FA0848B16056FCFA0035CEAB1AB3448953D3FDF15DE7BB7D0074C7EC7E94748CFEDA625621E3BA5BFB3C4D813C82E2
                              Malicious:false
                              Preview:000000007E0000000F0F00C2007C009494000000C100000000860000000000E1E1E100575757000000000000000D007A7A0000000025252500000000292900000082000017170000FCFC00050505006100000000C500B500AC0077777700D8D8D8000000FE00BC002100000000009300003900787878787800BEBE0000FE0000EE000075757500ACACAC001E1E0000005C000000000000000D0D0D0D0D0D0D0000005200140008000000004F4F000000006000006B6B6B0017001E006000DA0055550000004A4A00000000001400005757575757003B3B00010000E1E1005757575757005A5A000000A9A9009E005A5A00D7D7D700610000C90000000000D0D0D0D000A4A400007F00000000006A6A0000CA00007B7B00E2008E8E8E00B100D30000BBBBBB00E8000000000077770063636300002600DE00E3E3E3000028001212000000000000007A7A0000CE00EC007676760000005757009F9F00AD00A5A5003D004C4C4C0000003131310000ACACAC000054000000000000000000000000F3F300292900000000020074000000BA00000200000000A8000000AB00000000004C4C4C4C4C00007E000000000000000000888800D2D2000202020200A3A3A3000000E70000FE0000970000860000C4000000170000005E0000BC00F9000000AA000000FA00A9000083000000C3C3C300777700
                              Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                              File Type:PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
                              Category:dropped
                              Size (bytes):32368
                              Entropy (8bit):6.393948275188786
                              Encrypted:false
                              SSDEEP:384:yWweWqlXnYcLpSfX0lawccfNXLWrdzy+A2jc2EPLNtAf/uPHRN7AJ/AlGseC62c:EqlXYcgEAwcc17Wc+bj+PLHuMU/xjx2c
                              MD5:F2A123183E106BB1CF19376A8079D171
                              SHA1:2B96296BE92D5F2EF7C59A70858AF4CAABC99A9D
                              SHA-256:896D4ED138C35ECF19AE432380096562872EAB103F7E352C15D214FD875B337A
                              SHA-512:FCA6A89EFB16780A06CD25A55638882970F03E1535180A0E463AF9794184B04EB345CF29B12D4F261094E04A584E9225A7AD36A62631227451059F64A77B3C67
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              • Antivirus: Virustotal, Detection: 0%, Browse
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....[............" .....P................................................................`...@......@............... ......................................<........Z..p$...p..........T...............................................................H............text....N.......P.................. ..`.data........`.......R..............@....reloc.......p.......X..............@..B............................................0.............................4...V.S._.V.E.R.S.I.O.N._.I.N.F.O...................y.........?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...Z.!...C.o.m.m.e.n.t.s...S.y.s.t.e.m...R.e.f.l.e.c.t.i.o.n...T.y.p.e.E.x.t.e.n.s.i.o.n.s.....L.....C.o.m.p.a.n.y.N.a.m.e.....M.i.c.r.o.s.o.f.t. .C.o.r.p.o.r.a.t.i.o.n...j.!...F.i.l.e.D.e.s.c.r.i.p.
                              Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                              File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                              Category:dropped
                              Size (bytes):225
                              Entropy (8bit):6.596645802250635
                              Encrypted:false
                              SSDEEP:6:6v/lhPysi5NuhsPwRngRfPq/3+phjSfVsup:6v/7thstJACSNsc
                              MD5:F894266AB6A933B2FDA751E6490C319A
                              SHA1:2D2D3635198FEEFCB64D1D6B3CDCCDC4EA3DF4B0
                              SHA-256:95F533585B4C61936C369557B3B7E397E56545A4C9DB9A5BDDD0E9ABB7A7F7E7
                              SHA-512:977ED04753C3CB2B883D03A2A55001F6FCC8617DC3060B6C25AB7E5C691C3F76049E7DEADC7F6567AB7E8DC8492DE2874E8E632CF3EAD7B39ABC8CC98D331442
                              Malicious:false
                              Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8..1..@.E...".u.`..#.v.,r.[..1$..]B.@6.,,.e.....fwg...._)9........y..[n...t.$g..:...P....@k.q......W.. .PY.$z..x....t..(-~!.0$:P.t......`.......Ba..Y.....IEND.B`.
                              Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                              File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                              Category:dropped
                              Size (bytes):263
                              Entropy (8bit):6.731374842054556
                              Encrypted:false
                              SSDEEP:6:6v/lhPysw9TXm0RZC/8xhbPgfdSwj4vw29OjuAO4+ZvYNVp:6v/7QVXm0a/8xhbPgfdSBvNYn2ZvYd
                              MD5:003B524806C1CA654CAC6ED2EB883E1B
                              SHA1:F6F6ACA125DC4DB3B33378404017B5EE7D21D334
                              SHA-256:2899E53769FA741E2C0675A2C69D2C246A8F34601BEE58DD66B16261005962A9
                              SHA-512:AA905997F9CE39F039E33C4CCA167C0137775D91B4929D918528BA00B92737C448EC46D91A4221644CCC00D1FCAA403AFF83F07276BAB6FD80D4B9E88E652F87
                              Malicious:false
                              Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...K..1.D......g.e=.x......[]....Y$J'..`.@.S)R.4.q.D.K....x..%..0>~.;}..^.X....Lt.f!..K.....D.&,.7,..BM..t@..}N..o.?.....Hv.J...(..r.. ..)L....&..dT<..1y...X..X...............q...p..p.....IEND.B`.
                              Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                              File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                              Category:dropped
                              Size (bytes):337
                              Entropy (8bit):7.143668471552015
                              Encrypted:false
                              SSDEEP:6:6v/lhPWFmX9Ckymx8BZhCjO5QO6MsHqd+K/eBDQeU2oG9xqgjp:6v/7K0omx8yOqVtHH1U2oGR
                              MD5:7FBFE5B0A7AD2A67AACFD8481F8DCA01
                              SHA1:21BABB6B7EC4746835DB43DC6A69A4AF0EFECA2D
                              SHA-256:0B4CD789E087F712F131FACCD754DC461774498DF3CA19B346D461D18A0AE622
                              SHA-512:3A8F0D9653301F789A0588E848C40FFC92394461BF70A3421ABC85647F2C115948134FE9E161D055A11D200536356A15677D9C0E645346D27E122001F67FE22B
                              Malicious:false
                              Preview:.PNG........IHDR................a....IDATx..S.r.P..=7.cw.....W.m...=......V....I...K.?#@D.0G......R.rF..^$....p..b..f.<.T.z......... +..3#.v.K...$....pT.j.....[.......r..p....O.2.Y.T.,......==...9{/...T./....Qa...3%....5...xmkI.7.1..P,g.%y..J..#^.e..I(.%jzI..#../..49...*..?#..I. =~..E.,MN@........`...../...=.-...1....IEND.B`.
                              Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):222555
                              Entropy (8bit):7.344342205951728
                              Encrypted:false
                              SSDEEP:3072:pBmSzQUCQ7eiGVj+oHu80OFKzRem/0qaVnuHyAkwbH4A5ICfxHSdjByvg4T:fmioZd+osLdL/0FuVTjAuypPo
                              MD5:1247D9E48508188AEA42C1860C123BDB
                              SHA1:B94FAE1C07539802B0D102309BA9B6F2A10C2638
                              SHA-256:C6FAD708D2D267FA214B467BA745F085BE0F86DE24F1CBD6DB02F9A168359668
                              SHA-512:C2A18EA7DE077087EF70780D10796F338C7FD9764777E33F6AB6B68F32E370DC063AC463A1AF6299A9A50F8410352E5CC9D90F290389D7531F6B4A5666459BFD
                              Malicious:false
                              Preview:...........;;;............................................C.............y................|||.....6..............................................................ppp..........77.........X.......)))......MM.......;;...........................FFFFFF..............RR.................00....;;;;;;...........5........uu.........).......dd................t................L.q.)..y.....++............5.........**...........L....<.!......o..................((..AAA...............VVV..WW...xxx..w.............4444..*.....f...............D.....T.....yyy...............!!..jj..bb.ccccc.B...1...;..........V.............g..q.........v....,..xxxx...Z.{..........................................&...m...........www..$$.....b.M.......$.....YYYY.........bb.....j..iiiii...&........D.gg......~.................)))..000.FFFF.n........._.........---..........................g..............................##.........................))).Y.**.........................c.............bb........9.........T....................
                              Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):6144
                              Entropy (8bit):4.496995234059773
                              Encrypted:false
                              SSDEEP:96:1IUNaXnnXyEIPtXvZhr5RwiULuxDtJ1+wolpE:1Ix3XyEwXvZh1RwnLUDtf+I
                              MD5:E8B67A37FB41D54A7EDA453309D45D97
                              SHA1:96BE9BF7A988D9CEA06150D57CD1DE19F1FEC19E
                              SHA-256:2AD232BCCF4CA06CF13475AF87B510C5788AA790785FD50509BE483AFC0E0BCF
                              SHA-512:20EFFAE18EEBB2DF90D3186A281FA9233A97998F226F7ADEAD0784FBC787FEEE419973962F8369D8822C1BBCDFB6E7948D9CA6086C9CF90190C8AB3EC97F4C38
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              • Antivirus: Virustotal, Detection: 3%, Browse
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......+.Y.o.7Eo.7Eo.7Eo.6EF.7E..jEf.7E;..Em.7E..3En.7ERicho.7E........PE..L.....uY...........!................`........ ...............................P......................................`$..E.... ..d............................@..$.................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                              Category:dropped
                              Size (bytes):11776
                              Entropy (8bit):5.659384359264642
                              Encrypted:false
                              SSDEEP:192:ex24sihno00Wfl97nH6BenXwWobpWBTtvShJ5omi7dJWjOlESlS:h8QIl972eXqlWBFSt273YOlEz
                              MD5:8B3830B9DBF87F84DDD3B26645FED3A0
                              SHA1:223BEF1F19E644A610A0877D01EADC9E28299509
                              SHA-256:F004C568D305CD95EDBD704166FCD2849D395B595DFF814BCC2012693527AC37
                              SHA-512:D13CFD98DB5CA8DC9C15723EEE0E7454975078A776BCE26247228BE4603A0217E166058EBADC68090AFE988862B7514CB8CB84DE13B3DE35737412A6F0A8AC03
                              Malicious:false
                              Antivirus:
                              • Antivirus: ReversingLabs, Detection: 0%
                              • Antivirus: Virustotal, Detection: 1%, Browse
                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....uY...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..`....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                              Entropy (8bit):7.031249628696672
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:rJUSTIFICANTEDEPAGO.exe
                              File size:433352
                              MD5:e542cf9ce8a67a5b681cc9b0004e0b10
                              SHA1:40161158f7cab76c57b4d95798c74ebc7d612cfe
                              SHA256:4e78f6957f4c8c0f56a9b49e139342b1df7b1dc05518d96e776aa687a80f8c58
                              SHA512:5cb1f2132c5d85f068ed5fc35229df5f83d711f30748a951bd006569a24df0818aa24effb91d171a895f342b1b9e14ad2df8a2f1124e1ef2c7f8c74a6b9627ce
                              SSDEEP:6144:c6bAcJvkzKmPPzS58G93IuZjZz5VWY+LWWwseVp4ZLlbXrvAhM8LjbL7rrraAiGl:z7ubCHICV0LfwqZLlXTqMYvi7
                              TLSH:CA94F1227F97E857E4266D78608AEE19AEB0DF249205D317F37139EDE9B53016C2B103
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....uY.................d....:....
                              Icon Hash:20c4f8f8e8f0f24c
                              Entrypoint:0x403350
                              Entrypoint Section:.text
                              Digitally signed:true
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x59759518 [Mon Jul 24 06:35:04 2017 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:b34f154ec913d2d2c435cbd644e91687
                              Signature Valid:false
                              Signature Issuer:E=Baccheion@Train.Ric, OU="Ukampdygtige Ratteners Fllesskolernes ", O=Amerciament, L=Putnam Valley, S=New York, C=US
                              Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                              Error Number:-2146762487
                              Not Before, Not After
                              • 21/12/2022 05:52:29 20/12/2025 05:52:29
                              Subject Chain
                              • E=Baccheion@Train.Ric, OU="Ukampdygtige Ratteners Fllesskolernes ", O=Amerciament, L=Putnam Valley, S=New York, C=US
                              Version:3
                              Thumbprint MD5:9D5FC1EED3EFD5AE85C5FE4E5DE73B01
                              Thumbprint SHA-1:5C6F3AFCFAAFE00B47463625067078E82ACF72F1
                              Thumbprint SHA-256:29E893BEBBB82AB1F213286EF68814B75D778BAB740B54B6457C756488BE3856
                              Serial:53BB1A3E0600B528584097460509366C59C5C7CB
                              Instruction
                              sub esp, 000002D4h
                              push ebx
                              push esi
                              push edi
                              push 00000020h
                              pop edi
                              xor ebx, ebx
                              push 00008001h
                              mov dword ptr [esp+14h], ebx
                              mov dword ptr [esp+10h], 0040A2E0h
                              mov dword ptr [esp+1Ch], ebx
                              call dword ptr [004080A8h]
                              call dword ptr [004080A4h]
                              and eax, BFFFFFFFh
                              cmp ax, 00000006h
                              mov dword ptr [007A8A2Ch], eax
                              je 00007FCB90F077D3h
                              push ebx
                              call 00007FCB90F0AA69h
                              cmp eax, ebx
                              je 00007FCB90F077C9h
                              push 00000C00h
                              call eax
                              mov esi, 004082B0h
                              push esi
                              call 00007FCB90F0A9E3h
                              push esi
                              call dword ptr [00408150h]
                              lea esi, dword ptr [esi+eax+01h]
                              cmp byte ptr [esi], 00000000h
                              jne 00007FCB90F077ACh
                              push 0000000Ah
                              call 00007FCB90F0AA3Ch
                              push 00000008h
                              call 00007FCB90F0AA35h
                              push 00000006h
                              mov dword ptr [007A8A24h], eax
                              call 00007FCB90F0AA29h
                              cmp eax, ebx
                              je 00007FCB90F077D1h
                              push 0000001Eh
                              call eax
                              test eax, eax
                              je 00007FCB90F077C9h
                              or byte ptr [007A8A2Fh], 00000040h
                              push ebp
                              call dword ptr [00408044h]
                              push ebx
                              call dword ptr [004082A0h]
                              mov dword ptr [007A8AF8h], eax
                              push ebx
                              lea eax, dword ptr [esp+34h]
                              push 000002B4h
                              push eax
                              push ebx
                              push 0079FEE0h
                              call dword ptr [00408188h]
                              push 0040A2C8h
                              Programming Language:
                              • [EXP] VC++ 6.0 SP5 build 8804
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d00000x28268.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x67a880x2240.data
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x63c80x6400False0.6766015625data6.504099201068482IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x80000x138e0x1400False0.4509765625data5.146454805063938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0xa0000x39eb380x600unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .ndata0x3a90000x270000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x3d00000x282680x28400False0.3355129076086957data4.767250735975199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountry
                              RT_ICON0x3d03100x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States
                              RT_ICON0x3e0b380x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States
                              RT_ICON0x3e9fe00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States
                              RT_ICON0x3ef4680x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States
                              RT_ICON0x3f36900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States
                              RT_ICON0x3f5c380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States
                              RT_ICON0x3f6ce00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States
                              RT_ICON0x3f76680x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States
                              RT_DIALOG0x3f7ad00x100dataEnglishUnited States
                              RT_DIALOG0x3f7bd00xf8dataEnglishUnited States
                              RT_DIALOG0x3f7cc80xa0dataEnglishUnited States
                              RT_DIALOG0x3f7d680x60dataEnglishUnited States
                              RT_GROUP_ICON0x3f7dc80x76dataEnglishUnited States
                              RT_MANIFEST0x3f7e400x423XML 1.0 document, ASCII text, with very long lines (1059), with no line terminatorsEnglishUnited States
                              DLLImport
                              KERNEL32.dllSetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                              USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                              GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                              SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                              ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                              COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                              ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSource PortDest PortSource IPDest IP
                              Mar 20, 2023 11:23:11.148125887 CET49816443192.168.11.20172.217.16.206
                              Mar 20, 2023 11:23:11.148149967 CET44349816172.217.16.206192.168.11.20
                              Mar 20, 2023 11:23:11.148309946 CET49816443192.168.11.20172.217.16.206
                              Mar 20, 2023 11:23:11.161170959 CET49816443192.168.11.20172.217.16.206
                              Mar 20, 2023 11:23:11.161183119 CET44349816172.217.16.206192.168.11.20
                              Mar 20, 2023 11:23:11.193301916 CET44349816172.217.16.206192.168.11.20
                              Mar 20, 2023 11:23:11.193433046 CET49816443192.168.11.20172.217.16.206
                              Mar 20, 2023 11:23:11.193612099 CET49816443192.168.11.20172.217.16.206
                              Mar 20, 2023 11:23:11.194029093 CET44349816172.217.16.206192.168.11.20
                              Mar 20, 2023 11:23:11.194288969 CET49816443192.168.11.20172.217.16.206
                              Mar 20, 2023 11:23:11.265213013 CET49816443192.168.11.20172.217.16.206
                              Mar 20, 2023 11:23:11.266252041 CET44349816172.217.16.206192.168.11.20
                              Mar 20, 2023 11:23:11.266392946 CET49816443192.168.11.20172.217.16.206
                              Mar 20, 2023 11:23:11.269294024 CET49816443192.168.11.20172.217.16.206
                              Mar 20, 2023 11:23:11.312500000 CET44349816172.217.16.206192.168.11.20
                              Mar 20, 2023 11:23:11.548156977 CET44349816172.217.16.206192.168.11.20
                              Mar 20, 2023 11:23:11.548352957 CET49816443192.168.11.20172.217.16.206
                              Mar 20, 2023 11:23:11.548438072 CET44349816172.217.16.206192.168.11.20
                              Mar 20, 2023 11:23:11.548583984 CET49816443192.168.11.20172.217.16.206
                              Mar 20, 2023 11:23:11.548625946 CET44349816172.217.16.206192.168.11.20
                              Mar 20, 2023 11:23:11.548651934 CET49816443192.168.11.20172.217.16.206
                              Mar 20, 2023 11:23:11.548688889 CET44349816172.217.16.206192.168.11.20
                              Mar 20, 2023 11:23:11.548733950 CET44349816172.217.16.206192.168.11.20
                              Mar 20, 2023 11:23:11.548985958 CET49816443192.168.11.20172.217.16.206
                              Mar 20, 2023 11:23:11.548985958 CET49816443192.168.11.20172.217.16.206
                              Mar 20, 2023 11:23:11.548985958 CET49816443192.168.11.20172.217.16.206
                              Mar 20, 2023 11:23:11.641153097 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:11.641195059 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:11.641344070 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:11.641753912 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:11.641777992 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:11.681567907 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:11.681797981 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:11.681797981 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:11.682383060 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:11.682543039 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:11.682563066 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:11.685803890 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:11.685817957 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:11.686108112 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:11.686331034 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:11.686677933 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:11.728390932 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.091964960 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.092227936 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.092228889 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.092359066 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.092581987 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.092612028 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.092665911 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.092758894 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.092834949 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.092834949 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.093034983 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.093281984 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.093947887 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.094284058 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.094346046 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.094567060 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.096529007 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.096740007 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.096829891 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.097059965 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.098711967 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.099062920 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.100601912 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.100784063 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.100878954 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.101051092 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.101166964 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.101330996 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.101402998 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.101568937 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.101603031 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.101632118 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.101773977 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.101773977 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.101876020 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.102026939 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.102076054 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.102236986 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.102243900 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.102284908 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.102389097 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.102389097 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.102442026 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.102590084 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.102626085 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.102776051 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.103457928 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.103616953 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.103741884 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.103909969 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.103996038 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.104151964 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.104202986 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.104234934 CET44349817142.250.186.33192.168.11.20
                              Mar 20, 2023 11:23:12.104352951 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.104353905 CET49817443192.168.11.20142.250.186.33
                              Mar 20, 2023 11:23:12.104458094 CET44349817142.250.186.33192.168.11.20
                              TimestampSource PortDest PortSource IPDest IP
                              Mar 20, 2023 11:23:11.131897926 CET5365853192.168.11.201.1.1.1
                              Mar 20, 2023 11:23:11.141695023 CET53536581.1.1.1192.168.11.20
                              Mar 20, 2023 11:23:11.612874031 CET6238253192.168.11.201.1.1.1
                              Mar 20, 2023 11:23:11.639658928 CET53623821.1.1.1192.168.11.20
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Mar 20, 2023 11:23:11.131897926 CET192.168.11.201.1.1.10x8c78Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                              Mar 20, 2023 11:23:11.612874031 CET192.168.11.201.1.1.10x5dc4Standard query (0)doc-0s-98-docs.googleusercontent.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Mar 20, 2023 11:23:11.141695023 CET1.1.1.1192.168.11.200x8c78No error (0)drive.google.com172.217.16.206A (IP address)IN (0x0001)false
                              Mar 20, 2023 11:23:11.639658928 CET1.1.1.1192.168.11.200x5dc4No error (0)doc-0s-98-docs.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)false
                              Mar 20, 2023 11:23:11.639658928 CET1.1.1.1192.168.11.200x5dc4No error (0)googlehosted.l.googleusercontent.com142.250.186.33A (IP address)IN (0x0001)false
                              • drive.google.com
                              • doc-0s-98-docs.googleusercontent.com

                              Click to jump to process

                              Target ID:2
                              Start time:11:21:21
                              Start date:20/03/2023
                              Path:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                              Imagebase:0x400000
                              File size:433352 bytes
                              MD5 hash:E542CF9CE8A67A5B681CC9B0004E0B10
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.2804076292.0000000005376000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low

                              Target ID:7
                              Start time:11:23:02
                              Start date:20/03/2023
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\rJUSTIFICANTEDEPAGO.exe
                              Imagebase:0xaa0000
                              File size:108664 bytes
                              MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:.Net C# or VB.NET
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.6893759617.00000000360C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.6893759617.00000000360C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high

                              Target ID:8
                              Start time:11:23:02
                              Start date:20/03/2023
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff78c150000
                              File size:875008 bytes
                              MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              No disassembly