Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:830908
MD5:856572778608242656795bd15cc3683c
SHA1:ef79e01019b9518fa82e8dc628d416cd9ccd7817
SHA256:be316d90b0e5c1f88f32fa6dc7cf5b2c760c8ea63e7ddec3e2303cccf8ae25f9
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Detected unpacking (overwrites its own PE header)
Yara detected AgentTesla
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for dropped file
Detected unpacking (creates a PE file in dynamic memory)
Tries to steal Mail credentials (via file / registry access)
Maps a DLL or memory area into another process
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • file.exe (PID: 1544 cmdline: C:\Users\user\Desktop\file.exe MD5: 856572778608242656795BD15CC3683C)
    • zjlxnt.exe (PID: 5320 cmdline: "C:\Users\user\AppData\Local\Temp\zjlxnt.exe" C:\Users\user\AppData\Local\Temp\anaictjg.cte MD5: A22E128E1C66E8E76F2F05CA2D81A8F1)
      • conhost.exe (PID: 4496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • zjlxnt.exe (PID: 6076 cmdline: C:\Users\user\AppData\Local\Temp\zjlxnt.exe MD5: A22E128E1C66E8E76F2F05CA2D81A8F1)
  • cleanup
{"Exfil Mode": "SMTP", "Host": "us2.smtp.mailhostbox.com", "Username": "log3@forrwel.net", "Password": "HNnNLPY3          "}
SourceRuleDescriptionAuthorStrings
00000003.00000002.575938781.0000000002391000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000003.00000002.575938781.0000000002391000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Process Memory Space: zjlxnt.exe PID: 6076JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        Process Memory Space: zjlxnt.exe PID: 6076JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: file.exeReversingLabs: Detection: 48%
          Source: file.exeVirustotal: Detection: 47%Perma Link
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeReversingLabs: Detection: 41%
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeVirustotal: Detection: 34%Perma Link
          Source: file.exeJoe Sandbox ML: detected
          Source: 3.2.zjlxnt.exe.4800000.4.unpackAvira: Label: TR/Spy.Gen8
          Source: 3.2.zjlxnt.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
          Source: 3.2.zjlxnt.exe.417058.1.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "us2.smtp.mailhostbox.com", "Username": "log3@forrwel.net", "Password": "HNnNLPY3 "}

          Compliance

          barindex
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeUnpacked PE file: 3.2.zjlxnt.exe.400000.0.unpack
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeUnpacked PE file: 3.2.zjlxnt.exe.4800000.4.unpack
          Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: wntdll.pdbUGP source: zjlxnt.exe, 00000001.00000003.312180098.000000001A280000.00000004.00001000.00020000.00000000.sdmp, zjlxnt.exe, 00000001.00000003.313487812.000000001A0F0000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: zjlxnt.exe, 00000001.00000003.312180098.000000001A280000.00000004.00001000.00020000.00000000.sdmp, zjlxnt.exe, 00000001.00000003.313487812.000000001A0F0000.00000004.00001000.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040290B FindFirstFileW,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 1_2_004089F8 FindFirstFileExW,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 3_2_00406715 FindFirstFileExW,
          Source: Joe Sandbox ViewIP Address: 208.91.199.224 208.91.199.224
          Source: global trafficTCP traffic: 192.168.2.5:49703 -> 208.91.199.224:587
          Source: global trafficTCP traffic: 192.168.2.5:49703 -> 208.91.199.224:587
          Source: zjlxnt.exe, 00000003.00000002.575938781.00000000023E9000.00000004.00000800.00020000.00000000.sdmp, zjlxnt.exe, 00000003.00000002.577003560.0000000005458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
          Source: zjlxnt.exe, 00000003.00000002.575938781.00000000023E9000.00000004.00000800.00020000.00000000.sdmp, zjlxnt.exe, 00000003.00000002.577003560.0000000005458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
          Source: zjlxnt.exe, 00000003.00000002.577003560.0000000005458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.usertru
          Source: zjlxnt.exe, 00000003.00000002.575938781.00000000023E9000.00000004.00000800.00020000.00000000.sdmp, zjlxnt.exe, 00000003.00000002.577003560.0000000005458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
          Source: zjlxnt.exe, 00000003.00000002.577003560.0000000005458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo?
          Source: file.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: zjlxnt.exe, 00000003.00000002.575938781.00000000023E9000.00000004.00000800.00020000.00000000.sdmp, zjlxnt.exe, 00000003.00000002.577003560.0000000005458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
          Source: zjlxnt.exe, 00000003.00000002.575938781.00000000023E9000.00000004.00000800.00020000.00000000.sdmp, zjlxnt.exe, 00000003.00000002.577003560.0000000005458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0A
          Source: zjlxnt.exe, 00000003.00000002.575938781.00000000023E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://us2.smtp.mailhostbox.com
          Source: zjlxnt.exe, 00000003.00000002.575938781.00000000023E9000.00000004.00000800.00020000.00000000.sdmp, zjlxnt.exe, 00000003.00000002.577003560.0000000005458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
          Source: unknownDNS traffic detected: queries for: us2.smtp.mailhostbox.com
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405809 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,
          Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00406D5F
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 1_2_00410371
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 3_2_0040CBD1
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 3_2_02177238
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 3_2_0217C2D0
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 3_2_02177E50
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 3_2_021702C2
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 3_2_02177580
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 3_2_0521AA2B
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: String function: 004019C0 appears 42 times
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: String function: 00401EE0 appears 33 times
          Source: file.exeReversingLabs: Detection: 48%
          Source: file.exeVirustotal: Detection: 47%
          Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
          Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\zjlxnt.exe "C:\Users\user\AppData\Local\Temp\zjlxnt.exe" C:\Users\user\AppData\Local\Temp\anaictjg.cte
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess created: C:\Users\user\AppData\Local\Temp\zjlxnt.exe C:\Users\user\AppData\Local\Temp\zjlxnt.exe
          Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\zjlxnt.exe "C:\Users\user\AppData\Local\Temp\zjlxnt.exe" C:\Users\user\AppData\Local\Temp\anaictjg.cte
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess created: C:\Users\user\AppData\Local\Temp\zjlxnt.exe C:\Users\user\AppData\Local\Temp\zjlxnt.exe
          Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\nsi8BD6.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/4@1/1
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004021AA CoCreateInstance,
          Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404AB5 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4496:120:WilError_01
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 3_2_0040147B GetModuleHandleW,GetModuleHandleW,FindResourceW,GetModuleHandleW,LoadResource,LockResource,GetModuleHandleW,SizeofResource,FreeResource,ExitProcess,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCommand line argument: A
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
          Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: wntdll.pdbUGP source: zjlxnt.exe, 00000001.00000003.312180098.000000001A280000.00000004.00001000.00020000.00000000.sdmp, zjlxnt.exe, 00000001.00000003.313487812.000000001A0F0000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: zjlxnt.exe, 00000001.00000003.312180098.000000001A280000.00000004.00001000.00020000.00000000.sdmp, zjlxnt.exe, 00000001.00000003.313487812.000000001A0F0000.00000004.00001000.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeUnpacked PE file: 3.2.zjlxnt.exe.400000.0.unpack
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeUnpacked PE file: 3.2.zjlxnt.exe.400000.0.unpack .text:ER;.rdata:R;.data:W; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeUnpacked PE file: 3.2.zjlxnt.exe.4800000.4.unpack
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 1_2_00410AA4 push ecx; ret
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 3_2_0040D2E1 push ecx; ret
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 3_2_02171B70 push eax; iretd
          Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\zjlxnt.exeJump to dropped file
          Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 752Thread sleep count: 6545 > 30
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -15679732462653109s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -100000s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -99888s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -99781s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -99671s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -99562s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -99452s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -99343s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -99234s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -99123s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -99013s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -98906s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -98796s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -98687s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -98578s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -98466s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -98358s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -98250s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -98136s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -98006s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -97844s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -97723s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -97594s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -97485s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -97344s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -97204s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -97056s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -96952s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -96843s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -96735s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -96625s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exe TID: 5644Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeWindow / User API: threadDelayed 6545
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405D74 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040699E FindFirstFileW,FindClose,
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040290B FindFirstFileW,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 1_2_004089F8 FindFirstFileExW,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 3_2_00406715 FindFirstFileExW,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 100000
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 99888
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 99781
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 99671
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 99562
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 99452
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 99343
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 99234
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 99123
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 99013
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 98906
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 98796
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 98687
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 98578
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 98466
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 98358
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 98250
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 98136
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 98006
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 97844
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 97723
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 97594
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 97485
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 97344
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 97204
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 97056
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 96952
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 96843
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 96735
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 96625
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end node
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeAPI call chain: ExitProcess graph end node
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 1_2_0040636B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 1_2_0040B0AF GetProcessHeap,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeMemory allocated: page read and write | page guard
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 1_2_004018F8 SetUnhandledExceptionFilter,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 1_2_0040636B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 1_2_00401BF3 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 1_2_00401796 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 3_2_00401E16 SetUnhandledExceptionFilter,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 3_2_00401C83 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 3_2_004060A4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 3_2_00401F2A SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeSection loaded: unknown target: C:\Users\user\AppData\Local\Temp\zjlxnt.exe protection: execute and read and write
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeProcess created: C:\Users\user\AppData\Local\Temp\zjlxnt.exe C:\Users\user\AppData\Local\Temp\zjlxnt.exe
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 1_2_00401A05 cpuid
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 1_2_0040167D GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,
          Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403640 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeCode function: 3_2_0217F418 GetUserNameW,

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000003.00000002.575938781.0000000002391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: zjlxnt.exe PID: 6076, type: MEMORYSTR
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
          Source: C:\Users\user\AppData\Local\Temp\zjlxnt.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
          Source: Yara matchFile source: 00000003.00000002.575938781.0000000002391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: zjlxnt.exe PID: 6076, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000003.00000002.575938781.0000000002391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: zjlxnt.exe PID: 6076, type: MEMORYSTR
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts211
          Windows Management Instrumentation
          Path Interception1
          Access Token Manipulation
          1
          Disable or Modify Tools
          1
          OS Credential Dumping
          1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
          System Shutdown/Reboot
          Default Accounts2
          Command and Scripting Interpreter
          Boot or Logon Initialization Scripts111
          Process Injection
          1
          Deobfuscate/Decode Files or Information
          1
          Credentials in Registry
          1
          Account Discovery
          Remote Desktop Protocol1
          Data from Local System
          Exfiltration Over Bluetooth1
          Non-Standard Port
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
          Obfuscated Files or Information
          Security Account Manager2
          File and Directory Discovery
          SMB/Windows Admin Shares1
          Email Collection
          Automated Exfiltration1
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)31
          Software Packing
          NTDS127
          System Information Discovery
          Distributed Component Object Model1
          Clipboard Data
          Scheduled Transfer11
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script131
          Virtualization/Sandbox Evasion
          LSA Secrets23
          Security Software Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          Access Token Manipulation
          Cached Domain Credentials131
          Virtualization/Sandbox Evasion
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items111
          Process Injection
          DCSync1
          Application Window Discovery
          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
          System Owner/User Discovery
          Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
          Remote System Discovery
          Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          file.exe49%ReversingLabsWin32.Trojan.Nemesis
          file.exe48%VirustotalBrowse
          file.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\zjlxnt.exe42%ReversingLabsWin32.Trojan.FormBook
          C:\Users\user\AppData\Local\Temp\zjlxnt.exe35%VirustotalBrowse
          SourceDetectionScannerLabelLinkDownload
          3.2.zjlxnt.exe.4800000.4.unpack100%AviraTR/Spy.Gen8Download File
          3.2.zjlxnt.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
          http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
          http://ocsp.sectigo.com0A0%URL Reputationsafe
          https://sectigo.com/CPS00%URL Reputationsafe
          http://crt.sectigo?0%Avira URL Cloudsafe
          http://crl.usertru0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          us2.smtp.mailhostbox.com
          208.91.199.224
          truefalse
            high
            NameSourceMaliciousAntivirus DetectionReputation
            http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#zjlxnt.exe, 00000003.00000002.575938781.00000000023E9000.00000004.00000800.00020000.00000000.sdmp, zjlxnt.exe, 00000003.00000002.577003560.0000000005458000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://ocsp.sectigo.com0Azjlxnt.exe, 00000003.00000002.575938781.00000000023E9000.00000004.00000800.00020000.00000000.sdmp, zjlxnt.exe, 00000003.00000002.577003560.0000000005458000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://sectigo.com/CPS0zjlxnt.exe, 00000003.00000002.575938781.00000000023E9000.00000004.00000800.00020000.00000000.sdmp, zjlxnt.exe, 00000003.00000002.577003560.0000000005458000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://nsis.sf.net/NSIS_ErrorErrorfile.exefalse
              high
              http://us2.smtp.mailhostbox.comzjlxnt.exe, 00000003.00000002.575938781.00000000023E9000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://crt.sectigo?zjlxnt.exe, 00000003.00000002.577003560.0000000005458000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://crl.usertruzjlxnt.exe, 00000003.00000002.577003560.0000000005458000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                208.91.199.224
                us2.smtp.mailhostbox.comUnited States
                394695PUBLIC-DOMAIN-REGISTRYUSfalse
                Joe Sandbox Version:37.0.0 Beryl
                Analysis ID:830908
                Start date and time:2023-03-20 19:42:10 +01:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 8m 4s
                Hypervisor based Inspection enabled:false
                Report type:light
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:7
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample file name:file.exe
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@6/4@1/1
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 20.4% (good quality ratio 19%)
                • Quality average: 79.3%
                • Quality standard deviation: 29.7%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                • Not all processes where analyzed, report is missing behavior information
                • Report creation exceeded maximum time and may have missing disassembly code information.
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                19:43:17API Interceptor30x Sleep call for process: zjlxnt.exe modified
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\Desktop\file.exe
                File Type:data
                Category:dropped
                Size (bytes):6061
                Entropy (8bit):7.152729915217053
                Encrypted:false
                SSDEEP:96:Farc6oYBg/DrYuvk2XO5oSwsnP+ZjVe9LWKdUdAAU0HJsUV7scbvbz4LUtnnIgAf:FarcRZ3hX1ShnP2jE9LXdEAARpP1rbvy
                MD5:8009F662B5AB8050A4F5AEEAE94BA722
                SHA1:FE55E206DB001BF178AD87DF2BC4A6A899482D2A
                SHA-256:3A5D1645A4DAB4AEF75FA65EC4B7585917C1527C0B913287179168B5EF18147A
                SHA-512:6CB0A5BBE859263A2D97745F06AC33952C783314F6B49B7CD387B4276C947BD51EF9ADE02CEC2F0D5E38561B9895CF6DB1262F2790E1530A9FCC33879C139E26
                Malicious:false
                Reputation:low
                Preview:.005m..f.F<...05o.:......?v>.3.3.<......M.knl.02a..c.E<...42c. ......4.D63.6.3.?.....E.gni.53P..805.p8.q?.2.8.u .a..beabo.H0..v..v.@3.`..i/7.p.6.t(2..g.}.u<..G-.0.3.h.f....w8L$.m.r.D;F...okc..m.;4.q.?.<@.4.0...m..u<f...@%.`4..D'd.O$..A5..=..<r..4M.knl.82a..Q..401ec.t4.M4...D;.D..d580..E9....E....3.u.mje.18e..`W..480.x<.p=.4.4.p-P..6.c.!....D%.|.eX.....+..t..0....e.a..`beP..580.p=.t>.8.5.p,XE..Md.....M9..e...@4......F1..u.|c.....Lq.}<...v<+480.}<;.&<.>..r.^.q8F0....q.^.q8F0...^..M...3uc.....}<F...kloe.=8e...548.r...t..w.(058.q..v..I.0A..q..34.q.p.}..u.{.w....}.p013......u.L.4F".u..04.t.t.q..p.x.u....q.8580..Y...}..E.4D'.q..80.}.t.t..w.p.p...X+AK..M......v.ZXK.J.E.....}.]..O.F.....u.X_.M.M......H...X...K.D.....}.\&....A..B....G...P5..O.E..P....\...Y...K.E..a....B...].4.T.4.q0.p..q..~<1|..x.q.>.t&.u.|1,.t..w.pe..\...w.p..u.T.4.Q.0.}.;.q%..5M%.}.;.qm..tL9.}.5013.6.].5.u...K...P3480..u...dR0.m...D4...B358.q.0342.}.e......dX4R0]<048[3^2^8Z5..p...d.a..
                Process:C:\Users\user\Desktop\file.exe
                File Type:data
                Category:dropped
                Size (bytes):381886
                Entropy (8bit):7.672264691913513
                Encrypted:false
                SSDEEP:6144:Ntm1Z1J8zN5MoAqIIGXyCk4642/VGan7ZhhlqbK88SlI5NX1GKGsGZExocCp:NI1ix5lAmxd4P27VKlGNX1GKGsHG
                MD5:BD05EB6029978E8A69332B07B4334349
                SHA1:990D883D1827493EB50825719F585D1ABC1113FB
                SHA-256:02D5CDB8D67E1003EA4A6134F8C935F7EABAEF5761AB25362353400F7892483A
                SHA-512:E6DB920547761D9E66448305DFE1984AE553DDC4DD52C50526854146C2E052604A11F4A048EA03CABB257900A1175B681AE300EA653B2D463B7CCBE026D95A19
                Malicious:false
                Reputation:low
                Preview:.+......,...................n............+.......+..............................................................................+...........................................................................................................................................................G...................j...........................................................................................................................................F...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\file.exe
                File Type:data
                Category:dropped
                Size (bytes):268841
                Entropy (8bit):7.971116927383392
                Encrypted:false
                SSDEEP:6144:Stm1Z1J8zN5MoAqIIGXyCk4642/VGan7ZhhlqbK88SlI5NF:SI1ix5lAmxd4P27VKlGNF
                MD5:3D14489C8EE3D764649F70D1A27542F9
                SHA1:59E98B00E554B4E30DEF17AEBF731571F88CBFCE
                SHA-256:0645F4AF22D167E907F2C7CEA114D05CB45CF3CE639CECD67E66DE9D0E190701
                SHA-512:65457B732E118EFA58971F670D3E6D335983914603BA84F0C774786A777C5778BD3506C76393585E55B6D7790167E2A5DECC745015452BF229FC38ED71126076
                Malicious:false
                Reputation:low
                Preview:R.".z.......D....1.....f..%.J..,.L.M.@..-.....FU.h:..:....0.(H.TU%e...dhh.A....^F'...h.U......q+B....NY:...f..S. ...O..'I.7.5...|..T.R.WWI5Px....mVE..10VZ......9,._.H.A9@-.7..z.>..zg.K.2....c0...fM..?n....):Bipo..wsH.3#.(],........%.l..<..z.u"..T...<..,.....v...._f...._...v...@..]-....^.U.h...:...'..()...%...(".,..9k...2...@.s...F...V ..h.m...M.W.....8O...I.7i.v..G........HX,.o_.&...._...n..m..0.......}..2..4I....a.F.....N.,"$@s~0.....o.....`%<....(.h.bD.......Ma-s....D...<..z..{_.u...........H..1...._f..%.J..,.L.M.......H.U.h...:V..'..()...%....".,...W..FF\........^......Jy..h$m...M.W..eq.R..R$/I.7.;..C....6.\..X,.4_..F..._...V..m..0.......}..E..I....a.F.....N.,"$@s~0...QLc.]...`%<....(.2.bW.......Ma-s....D...<..z.u"..T...4.......H..1...._f..%.J..,.L.M.@..-.....FU.h:..:...'..()...%....".,..9....2...@....gF....V ..h$m...M.W...q..8O..'I.7i.v..G...y>.\.HX,.4_..F..._...n..m..0.......}..E..I....a.F.....N.,"$@s~0...QLc.]...`%<....(.2.bW...
                Process:C:\Users\user\Desktop\file.exe
                File Type:PE32 executable (console) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):95744
                Entropy (8bit):6.226201646790148
                Encrypted:false
                SSDEEP:1536:+0ZlV4KXc4OxQEsGZDmS+jtBaK/eRuZocSZUpxwkyBp+NnFsSW81kxgsWJjcdvwk:Ld4KALsGZDN+x/yuZocSTkyBw9y8eASd
                MD5:A22E128E1C66E8E76F2F05CA2D81A8F1
                SHA1:589A59B124FACC5A045FA99B334E476415E57CA2
                SHA-256:EE05F69606802B01D1FA5BB8BC43885F7F5F66C53893DE380F9026CD3AFAA79D
                SHA-512:C646ED13AA87FC2345AAE5AC640CD6E3A4B46B780045C86F4A384F4AFFD7E9FD510D7F50ECF2AFBFB12F34734997077E4DC7DC46B1222A8EDE0D0D793F77468B
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 42%
                • Antivirus: Virustotal, Detection: 35%, Browse
                Reputation:low
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7...s...s...s...8...y...8.......8...g......U......b......`...8...j...s...........r.......r...Richs...........PE..L...V..d...............!.....|......".............@.........................................................................|k.......................................^...............................]..@............................................text............................... ..`.rdata...f.......h..................@..@.data...l............l..............@...........................................................................................................................................................................................................................................................................................................................................................................................................
                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                Entropy (8bit):7.932397161868976
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:file.exe
                File size:316557
                MD5:856572778608242656795bd15cc3683c
                SHA1:ef79e01019b9518fa82e8dc628d416cd9ccd7817
                SHA256:be316d90b0e5c1f88f32fa6dc7cf5b2c760c8ea63e7ddec3e2303cccf8ae25f9
                SHA512:df6e4621f566ba7f067e44f87fec3b0f7350a45b71d8401e3c1eeae0c82b24594bdc54e68787e61fd53193afbc31a85c0f5c90accf606fddf0fa59f6b591f077
                SSDEEP:6144:vYa6mUhRSVGVVj8vjpxMegWObBb3vztdsPTtH2vkcikg5JjzPw4312:vYYC0VGHWjpxTgDbBdebl2vkciksA
                TLSH:B964122427E4C593C4E342317C3A9AE5A8F9FA2B1560E70F276033587935AA1E70E323
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................h...*.....
                Icon Hash:b2a88c96b2ca6a72
                Entrypoint:0x403640
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x614F9B1F [Sat Sep 25 21:56:47 2021 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:61259b55b8912888e90f516ca08dc514
                Instruction
                push ebp
                mov ebp, esp
                sub esp, 000003F4h
                push ebx
                push esi
                push edi
                push 00000020h
                pop edi
                xor ebx, ebx
                push 00008001h
                mov dword ptr [ebp-14h], ebx
                mov dword ptr [ebp-04h], 0040A230h
                mov dword ptr [ebp-10h], ebx
                call dword ptr [004080C8h]
                mov esi, dword ptr [004080CCh]
                lea eax, dword ptr [ebp-00000140h]
                push eax
                mov dword ptr [ebp-0000012Ch], ebx
                mov dword ptr [ebp-2Ch], ebx
                mov dword ptr [ebp-28h], ebx
                mov dword ptr [ebp-00000140h], 0000011Ch
                call esi
                test eax, eax
                jne 00007F413CC5844Ah
                lea eax, dword ptr [ebp-00000140h]
                mov dword ptr [ebp-00000140h], 00000114h
                push eax
                call esi
                mov ax, word ptr [ebp-0000012Ch]
                mov ecx, dword ptr [ebp-00000112h]
                sub ax, 00000053h
                add ecx, FFFFFFD0h
                neg ax
                sbb eax, eax
                mov byte ptr [ebp-26h], 00000004h
                not eax
                and eax, ecx
                mov word ptr [ebp-2Ch], ax
                cmp dword ptr [ebp-0000013Ch], 0Ah
                jnc 00007F413CC5841Ah
                and word ptr [ebp-00000132h], 0000h
                mov eax, dword ptr [ebp-00000134h]
                movzx ecx, byte ptr [ebp-00000138h]
                mov dword ptr [0042A318h], eax
                xor eax, eax
                mov ah, byte ptr [ebp-0000013Ch]
                movzx eax, ax
                or eax, ecx
                xor ecx, ecx
                mov ch, byte ptr [ebp-2Ch]
                movzx ecx, cx
                shl eax, 10h
                or eax, ecx
                Programming Language:
                • [EXP] VC++ 6.0 SP5 build 8804
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b0000xcd8.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x66760x6800False0.6568134014423077data6.4174599871908855IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x80000x139a0x1400False0.4498046875data5.141066817170598IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0xa0000x203780x600False0.509765625data4.110582127654237IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .ndata0x2b0000x100000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x3b0000xcd80xe00False0.4224330357142857data4.220947409031048IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_ICON0x3b1d80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States
                RT_DIALOG0x3b4c00x100dataEnglishUnited States
                RT_DIALOG0x3b5c00x11cdataEnglishUnited States
                RT_DIALOG0x3b6e00x60dataEnglishUnited States
                RT_GROUP_ICON0x3b7400x14dataEnglishUnited States
                RT_VERSION0x3b7580x23cdataEnglishUnited States
                RT_MANIFEST0x3b9980x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States
                DLLImport
                ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampSource PortDest PortSource IPDest IP
                Mar 20, 2023 19:43:18.322552919 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:18.508263111 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:18.508500099 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:19.077830076 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:19.079662085 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:19.264877081 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:19.265360117 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:19.265678883 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:19.451806068 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:19.501507044 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:19.687264919 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:19.687323093 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:19.687382936 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:19.687422037 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:19.687428951 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:19.687489986 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:19.690313101 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:19.872652054 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:19.872816086 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:19.936322927 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:20.122263908 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:20.190968990 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:20.376351118 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:20.377393007 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:20.566237926 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:20.566880941 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:20.757528067 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:20.757951021 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:20.946297884 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:20.947021961 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:21.157416105 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:21.157855034 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:21.344383001 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:21.346679926 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:21.346805096 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:21.346874952 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:21.346931934 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:21.532103062 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:21.532279968 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:21.666341066 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:21.906209946 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:43:22.080671072 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:43:22.080802917 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:44:58.259578943 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:44:58.445679903 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:44:58.446547985 CET58749703208.91.199.224192.168.2.5
                Mar 20, 2023 19:44:58.446655989 CET49703587192.168.2.5208.91.199.224
                Mar 20, 2023 19:44:58.459429979 CET49703587192.168.2.5208.91.199.224
                TimestampSource PortDest PortSource IPDest IP
                Mar 20, 2023 19:43:18.274879932 CET6189353192.168.2.58.8.8.8
                Mar 20, 2023 19:43:18.297280073 CET53618938.8.8.8192.168.2.5
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Mar 20, 2023 19:43:18.274879932 CET192.168.2.58.8.8.80x9af3Standard query (0)us2.smtp.mailhostbox.comA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Mar 20, 2023 19:43:18.297280073 CET8.8.8.8192.168.2.50x9af3No error (0)us2.smtp.mailhostbox.com208.91.199.224A (IP address)IN (0x0001)false
                Mar 20, 2023 19:43:18.297280073 CET8.8.8.8192.168.2.50x9af3No error (0)us2.smtp.mailhostbox.com208.91.199.223A (IP address)IN (0x0001)false
                Mar 20, 2023 19:43:18.297280073 CET8.8.8.8192.168.2.50x9af3No error (0)us2.smtp.mailhostbox.com208.91.198.143A (IP address)IN (0x0001)false
                Mar 20, 2023 19:43:18.297280073 CET8.8.8.8192.168.2.50x9af3No error (0)us2.smtp.mailhostbox.com208.91.199.225A (IP address)IN (0x0001)false
                TimestampSource PortDest PortSource IPDest IPCommands
                Mar 20, 2023 19:43:19.077830076 CET58749703208.91.199.224192.168.2.5220 us2.outbound.mailhostbox.com ESMTP Postfix
                Mar 20, 2023 19:43:19.079662085 CET49703587192.168.2.5208.91.199.224EHLO 035347
                Mar 20, 2023 19:43:19.265360117 CET58749703208.91.199.224192.168.2.5250-us2.outbound.mailhostbox.com
                250-PIPELINING
                250-SIZE 41648128
                250-VRFY
                250-ETRN
                250-STARTTLS
                250-AUTH PLAIN LOGIN
                250-AUTH=PLAIN LOGIN
                250-ENHANCEDSTATUSCODES
                250-8BITMIME
                250-DSN
                250 CHUNKING
                Mar 20, 2023 19:43:19.265678883 CET49703587192.168.2.5208.91.199.224STARTTLS
                Mar 20, 2023 19:43:19.451806068 CET58749703208.91.199.224192.168.2.5220 2.0.0 Ready to start TLS

                Click to jump to process

                Target ID:0
                Start time:19:43:07
                Start date:20/03/2023
                Path:C:\Users\user\Desktop\file.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\Desktop\file.exe
                Imagebase:0x400000
                File size:316557 bytes
                MD5 hash:856572778608242656795BD15CC3683C
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                Target ID:1
                Start time:19:43:08
                Start date:20/03/2023
                Path:C:\Users\user\AppData\Local\Temp\zjlxnt.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\zjlxnt.exe" C:\Users\user\AppData\Local\Temp\anaictjg.cte
                Imagebase:0x400000
                File size:95744 bytes
                MD5 hash:A22E128E1C66E8E76F2F05CA2D81A8F1
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Antivirus matches:
                • Detection: 42%, ReversingLabs
                • Detection: 35%, Virustotal, Browse
                Reputation:low

                Target ID:2
                Start time:19:43:08
                Start date:20/03/2023
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff7fcd70000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:3
                Start time:19:43:09
                Start date:20/03/2023
                Path:C:\Users\user\AppData\Local\Temp\zjlxnt.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\AppData\Local\Temp\zjlxnt.exe
                Imagebase:0x400000
                File size:95744 bytes
                MD5 hash:A22E128E1C66E8E76F2F05CA2D81A8F1
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.575938781.0000000002391000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.575938781.0000000002391000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low

                No disassembly