Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SWIFT05062023.exe

Overview

General Information

Sample Name:SWIFT05062023.exe
Analysis ID:882717
MD5:b7475f585b317b4cdb0f385f147e635d
SHA1:c88c9416ffc3d97ac9ed1aeed6558c6f1b610207
SHA256:46887ad939b1f8d5e6588548aef4ebcbb3e924df26efc74ee5ddcdad4a23ed20
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Machine Learning detection for sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
PE file contains section with special chars
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Contains functionality to detect virtual machines (SLDT)
PE / OLE file has an invalid certificate
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)

Classification

  • System is w10x64
  • SWIFT05062023.exe (PID: 5660 cmdline: C:\Users\user\Desktop\SWIFT05062023.exe MD5: B7475F585B317B4CDB0F385F147E635D)
    • CasPol.exe (PID: 6952 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe MD5: F866FC1C2E928779C7119353C3091F0C)
  • cleanup
{"Exfil Mode": "Discord", "Discord url": "https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr9"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.799972283.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
    00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.540511718.0000016F11ADA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          Process Memory Space: CasPol.exe PID: 6952JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            0.2.SWIFT05062023.exe.16f11dafe48.1.unpackMSIL_SUSP_OBFUSC_XorStringsNetDetects XorStringsNET string encryption, and other obfuscators derived from itdr4k0nia
            • 0x18934:$pattern: 06 1E 58 07 8E 69 FE 17
            • 0x27a52:$a2: _CorExeMain
            • 0x238d6:$a3: mscorlib
            • 0x24c59:$a4: .cctor
            • 0x23656:$a6: <Module>
            0.2.SWIFT05062023.exe.16f11dafe48.1.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
              1.2.CasPol.exe.400000.0.unpackMSIL_SUSP_OBFUSC_XorStringsNetDetects XorStringsNET string encryption, and other obfuscators derived from itdr4k0nia
              • 0x1a734:$pattern: 06 1E 58 07 8E 69 FE 17
              • 0x29852:$a2: _CorExeMain
              • 0x256d6:$a3: mscorlib
              • 0x26a59:$a4: .cctor
              • 0x25456:$a6: <Module>
              1.2.CasPol.exe.400000.0.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.SWIFT05062023.exe.16f11dafe48.1.raw.unpackMSIL_SUSP_OBFUSC_XorStringsNetDetects XorStringsNET string encryption, and other obfuscators derived from itdr4k0nia
                • 0x1a734:$pattern: 06 1E 58 07 8E 69 FE 17
                • 0x4476c:$pattern: 06 1E 58 07 8E 69 FE 17
                • 0x29852:$a2: _CorExeMain
                • 0x5388a:$a2: _CorExeMain
                • 0x256d6:$a3: mscorlib
                • 0x4f70e:$a3: mscorlib
                • 0x26a59:$a4: .cctor
                • 0x50a91:$a4: .cctor
                • 0x25456:$a6: <Module>
                • 0x4f48e:$a6: <Module>
                Click to see the 1 entries
                No Sigma rule has matched
                Timestamp:192.168.2.4162.159.137.232496954432851779 06/06/23-17:26:57.544403
                SID:2851779
                Source Port:49695
                Destination Port:443
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Discord", "Discord url": "https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr9"}
                Source: SWIFT05062023.exeVirustotal: Detection: 22%Perma Link
                Source: SWIFT05062023.exeJoe Sandbox ML: detected
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: /log.tmp
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: KL
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: text/html
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: KL
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: text/html
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>[
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: yyyy-MM-dd HH:mm:ss
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ]<br>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PW
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: text/html
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: CO
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: application/zip
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Time:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>User Name:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>Computer Name:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>OSFullName:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>CPU:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>RAM:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IP Address:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <hr>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: New
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: MM/dd/yyyy HH:mm:ss
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: /
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IP Address:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: _
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: /
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: /
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: false
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: false
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: false
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: false
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: false
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: true
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: false
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 20
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 20
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 4
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr9
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: false
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: false
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: appdata
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PUEjh
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PUEjh.exe
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PUEjh
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Type
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: :
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: :
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <hr>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <b>[
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ]</b> (
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: )<br>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {BACK}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {ALT+TAB}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {ALT+F4}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {TAB}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {ESC}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {Win}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {CAPSLOCK}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {KEYUP}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {KEYDOWN}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {KEYLEFT}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {KEYRIGHT}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {DEL}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {END}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {HOME}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {Insert}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {NumLock}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {PageDown}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {PageUp}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {ENTER}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F1}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F2}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F3}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F4}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F5}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F6}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F7}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F8}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F9}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F10}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F11}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {F12}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: control
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {CTRL}
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: &
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: &amp;
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: &lt;
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: >
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: &gt;
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: "
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: &quot;
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <br><hr>Copied Text: <br>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <hr>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: logins
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IE/Edge
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Windows Secure Note
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 3CCD5499-87A8-4B10-A215-608888DD3B55
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Windows Web Password Credential
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 154E23D0-C644-4E6F-8CE6-5069272F999F
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Windows Credential Picker Protector
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Web Credentials
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Windows Credentials
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Windows Domain Certificate Credential
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Windows Domain Password Credential
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Windows Extended Credential
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 00000000-0000-0000-0000-000000000000
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SchemaId
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pResourceElement
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pIdentityElement
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pPackageSid
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pAuthenticatorElement
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IE/Edge
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: UC Browser
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: UCBrowser\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: *
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Login Data
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: journal
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: wow_logins
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Safari for Windows
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Common Files\Apple\Apple Application Support\plutil.exe
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Apple Computer\Preferences\keychain.plist
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <array>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <dict>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <string>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </string>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <string>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </string>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <data>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </data>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: -convert xml1 -s -o "
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \fixed_keychain.xml"
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: "
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: "
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Microsoft\Credentials\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Microsoft\Credentials\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Microsoft\Credentials\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Microsoft\Credentials\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Microsoft\Protect\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: credential
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: QQ Browser
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Tencent\QQBrowser\User Data
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Default\EncryptedStorage
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Profile
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \EncryptedStorage
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: entries
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: category
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: str3
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: str2
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: blob0
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: password_value
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IncrediMail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PopPassword
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SmtpPassword
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\IncrediMail\Identities\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Accounts_New
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PopPassword
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SmtpPassword
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SmtpServer
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: EmailAddress
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Eudora
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\Qualcomm\Eudora\CommandLine\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: current
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Settings
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SavePasswordText
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Settings
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ReturnAddress
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: -
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Falkon Browser
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \falkon\profiles\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: profiles.ini
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: startProfile=([A-z0-9\/\.\"]+)
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: profiles.ini
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \browsedata.db
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: autofill
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ClawsMail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Claws-mail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \clawsrc
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \clawsrc
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: passkey0
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: master_passphrase_salt=(.+)
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: master_passphrase_pbkdf2_rounds=(.+)
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \accountrc
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: smtp_server
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: address
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: account
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: [
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ]
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \passwordstorerc
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: {(.*),(.*)}(.*)
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Flock Browser
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: APPDATA
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Flock\Browser\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: signons3.txt
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ---
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: .
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ---
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: DynDns
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ALLUSERSPROFILE
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Dyn\Updater\config.dyndns
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: username=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: password=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: https://account.dyn.com/
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: t6KzXhCh
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ALLUSERSPROFILE
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Dyn\Updater\daemon.cfg
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: global
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: accounts
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: account.
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: username
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: account.
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Psi/Psi+
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: name
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: jid
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: jid
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Psi/Psi+
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: APPDATA
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Psi\profiles
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: APPDATA
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Psi+\profiles
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \accounts.xml
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \accounts.xml
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: OpenVPN
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\OpenVPN-GUI\configs
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\OpenVPN-GUI\configs
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\OpenVPN-GUI\configs\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: username
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: auth-data
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: entropy
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: USERPROFILE
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \OpenVPN\config\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: remote
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: remote
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: NordVPN
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: NordVPN
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: NordVpn.exe*
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: user.config
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: //setting[@name='Username']/value
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: //setting[@name='Password']/value
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: NordVPN
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: -
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Private Internet Access
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: %ProgramW6432%
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Private Internet Access\data
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ProgramFiles(x86)
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Private Internet Access\data
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \account.json
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: .*"username":"(.*?)"
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: .*"password":"(.*?)"
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Private Internet Access
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: privateinternetaccess.com
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: FileZilla
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: APPDATA
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \FileZilla\recentservers.xml
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: APPDATA
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \FileZilla\recentservers.xml
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <Server>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <Host>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <Host>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </Host>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: :
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <Port>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </Port>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <User>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <User>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </User>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <Pass encoding="base64">
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <Pass encoding="base64">
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </Pass>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <Pass>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <Pass encoding="base64">
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </Pass>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: CoreFTP
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SOFTWARE\FTPWare\COREFTP\Sites
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PW
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: User
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Host
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Port
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: hdfzpysvpzimorhk
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: WinSCP
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: HostName
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: UserName
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PublicKeyFile
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: :
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PortNumber
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 22
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: [PRIVATE KEY LOCATION: "{0}"]
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: WinSCP
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: A
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 10
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: B
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 11
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: C
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 12
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: D
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 13
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: E
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 14
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: F
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 15
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ABCDEF
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Flash FXP
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IP
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: :
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: port
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: user
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pass
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: quick.dat
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Sites.dat
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \FlashFXP\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \FlashFXP\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: yA36zA48dEhfrvghGRg57h5UlDv3
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: FTP Navigator
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SystemDrive
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \FTP Navigator\Ftplist.txt
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Server
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: No Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: User
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SmartFTP
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: APPDATA
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SmartFTP\Client 2.0\Favorites\Quick Connect
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: WS_FTP
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: appdata
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Ipswitch\WS_FTP\Sites\ws_ftp.ini
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: HOST
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: UID
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PWD
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PWD=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PWD=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: FtpCommander
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SystemDrive
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SystemDrive
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Program Files (x86)\FTP Commander\Ftplist.txt
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SystemDrive
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \cftp\Ftplist.txt
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander\Ftplist.txt
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \VirtualStore\Program Files (x86)\FTP Commander Deluxe\Ftplist.txt
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ;Password=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ;User=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ;Server=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ;Port=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ;Port=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ;Password=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ;User=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ;Anonymous=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: :
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: FTPGetter
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \FTPGetter\servers.xml
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <server>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <server_ip>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <server_ip>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </server_ip>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: :
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <server_port>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </server_port>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <server_user_name>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <server_user_name>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </server_user_name>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <server_user_password>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: <server_user_password>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: </server_user_password>
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: FTPGetter
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: The Bat!
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: appdata
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \The Bat!
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Account.CFN
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Account.CFN
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: zzz
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: +-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Becky!
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: HKEY_CURRENT_USER\Software\RimArts\B2\Settings
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: DataDir
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Folder.lst
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Mailbox.ini
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Account
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PassWd
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Account
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SMTPServer
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Account
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: MailAddress
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Becky!
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Outlook
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Email
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IMAP Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: POP3 Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: HTTP Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SMTP Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Email
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Email
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Email
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IMAP Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: POP3 Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: HTTP Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SMTP Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Server
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Windows Mail App
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: COMPlus_legacyCorruptedStateExceptionsPolicy
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 1
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Software\Microsoft\ActiveSync\Partners
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Email
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Server
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SchemaId
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pResourceElement
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pIdentityElement
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pPackageSid
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: pAuthenticatorElement
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: syncpassword
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: mailoutgoing
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: FoxMail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Executable
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: FoxmailPath
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Storage\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Storage\
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \mail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \mail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \VirtualStore\Program Files\Foxmail\mail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \VirtualStore\Program Files (x86)\Foxmail\mail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Accounts\Account.rec0
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Accounts\Account.rec0
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Account.stg
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Account.stg
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: POP3Host
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SMTPHost
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: IncomingServer
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Account
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: MailAddress
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: POP3Password
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 5A
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 71
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Opera Mail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Opera Mail\Opera Mail\wand.dat
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: opera:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: abcdefghijklmnopqrstuvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor:
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: PocoMail
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: appdata
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Pocomail\accounts.ini
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Email
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: POPPass
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SMTPPass
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SMTP
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: eM Client
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: eM Client\accounts.dat
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: eM Client
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Accounts
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: "Username":"
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ",
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: "Secret":"
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ",
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: 72905C47-F4FD-4CF7-A489-4E8121A155BD
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: "ProviderName":"
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: ",
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: o6806642kbM7c5
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Mailbird
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: SenderIdentities
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Accounts
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: \Mailbird\Store\Store.db
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Server_Host
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpackString decryptor: Accounts
                Source: unknownHTTPS traffic detected: 162.159.137.232:443 -> 192.168.2.4:49695 version: TLS 1.2
                Source: SWIFT05062023.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: CEMENT.pdb source: SWIFT05062023.exe, 00000000.00000002.540183808.0000016F00077000.00000004.00000800.00020000.00000000.sdmp, SWIFT05062023.exe, 00000000.00000002.542043646.0000016F708F0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: NMkLiJJ.pdbBSJB source: SWIFT05062023.exe
                Source: Binary string: NMkLiJJ.pdb source: SWIFT05062023.exe

                Networking

                barindex
                Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49695 -> 162.159.137.232:443
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: Joe Sandbox ViewIP Address: 162.159.137.232 162.159.137.232
                Source: global trafficHTTP traffic detected: POST /api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr9 HTTP/1.1Content-Type: multipart/form-data; boundary=----------eeaef95b509b45a590275f60ce750e22User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: discord.comContent-Length: 1168Expect: 100-continueConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr9 HTTP/1.1Content-Type: multipart/form-data; boundary=----------658f909b118b4ef2b71a26c0fc5e5610User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: discord.comContent-Length: 1954Expect: 100-continue
                Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
                Source: unknownNetwork traffic detected: HTTP traffic on port 49696 -> 443
                Source: SWIFT05062023.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                Source: SWIFT05062023.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                Source: SWIFT05062023.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                Source: SWIFT05062023.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                Source: CasPol.exe, 00000001.00000002.803904437.000000000656A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: SWIFT05062023.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                Source: SWIFT05062023.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                Source: SWIFT05062023.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                Source: SWIFT05062023.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                Source: SWIFT05062023.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                Source: CasPol.exe, 00000001.00000002.800774951.00000000036B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://discord.com
                Source: SWIFT05062023.exeString found in binary or memory: http://ocsp.digicert.com0
                Source: SWIFT05062023.exeString found in binary or memory: http://ocsp.digicert.com0A
                Source: SWIFT05062023.exeString found in binary or memory: http://ocsp.digicert.com0C
                Source: SWIFT05062023.exeString found in binary or memory: http://ocsp.digicert.com0X
                Source: SWIFT05062023.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
                Source: SWIFT05062023.exeString found in binary or memory: http://s.symcd.com06
                Source: CasPol.exe, 00000001.00000002.800774951.00000000036A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: SWIFT05062023.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
                Source: SWIFT05062023.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
                Source: SWIFT05062023.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
                Source: SWIFT05062023.exeString found in binary or memory: http://www.digicert.com/CPS0
                Source: CasPol.exe, 00000001.00000002.800774951.00000000036D7000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000001.00000002.800774951.00000000036D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/1114977416134279200/1115663127888011334/user-226546_2023-06-
                Source: CasPol.exe, 00000001.00000002.800774951.0000000003754000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/attachments/1114977416134279200/1115663130656251924/user-226546_2023-06-
                Source: SWIFT05062023.exeString found in binary or memory: https://d.symcb.com/cps0%
                Source: SWIFT05062023.exeString found in binary or memory: https://d.symcb.com/rpa0
                Source: SWIFT05062023.exeString found in binary or memory: https://d.symcb.com/rpa0.
                Source: CasPol.exe, 00000001.00000002.800774951.00000000036A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com
                Source: CasPol.exe, 00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLv
                Source: CasPol.exe, 00000001.00000002.800774951.00000000036A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com4
                Source: CasPol.exe, 00000001.00000002.800774951.00000000036F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.comD8
                Source: CasPol.exe, 00000001.00000002.800774951.00000000036D7000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000001.00000002.800774951.00000000036D3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://media.discordapp.net/attachments/1114977416134279200/1115663127888011334/user-226546_2023-0
                Source: CasPol.exe, 00000001.00000002.800774951.0000000003754000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://media.discordapp.net/attachments/1114977416134279200/1115663130656251924/user-226546_2023-0
                Source: unknownHTTP traffic detected: POST /api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr9 HTTP/1.1Content-Type: multipart/form-data; boundary=----------eeaef95b509b45a590275f60ce750e22User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: discord.comContent-Length: 1168Expect: 100-continueConnection: Keep-Alive
                Source: unknownDNS traffic detected: queries for: discord.com
                Source: unknownHTTPS traffic detected: 162.159.137.232:443 -> 192.168.2.4:49695 version: TLS 1.2

                System Summary

                barindex
                Source: SWIFT05062023.exeStatic PE information: section name: 5d)=X
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 1.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: 0.2.SWIFT05062023.exe.16f11dafe48.1.raw.unpack, type: UNPACKEDPEMatched rule: MSIL_SUSP_OBFUSC_XorStringsNet author = dr4k0nia, description = Detects XorStringsNET string encryption, and other obfuscators derived from it, score = 26/03/2023, version = 1.0, reference = https://github.com/dr4k0nia/yara-rules
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_05759C80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_05759FC8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_0575C858
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_0575A898
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_05755967
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_067995C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_06794040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_06792C41
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_0679C640
                Source: SWIFT05062023.exeStatic PE information: No import functions for PE file found
                Source: SWIFT05062023.exe, 00000000.00000000.536092515.0000016F705D4000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNMkLiJJ.exe0 vs SWIFT05062023.exe
                Source: SWIFT05062023.exe, 00000000.00000002.541859858.0000016F7067D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SWIFT05062023.exe
                Source: SWIFT05062023.exe, 00000000.00000002.540183808.0000016F00077000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCEMENT.dll. vs SWIFT05062023.exe
                Source: SWIFT05062023.exe, 00000000.00000002.540183808.0000016F00077000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec89e5d5e-4067-4402-9137-ef1c5a8aad80.exe4 vs SWIFT05062023.exe
                Source: SWIFT05062023.exe, 00000000.00000002.540511718.0000016F11ADA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec89e5d5e-4067-4402-9137-ef1c5a8aad80.exe4 vs SWIFT05062023.exe
                Source: SWIFT05062023.exe, 00000000.00000002.542043646.0000016F708F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCEMENT.dll. vs SWIFT05062023.exe
                Source: SWIFT05062023.exeBinary or memory string: OriginalFilenameNMkLiJJ.exe0 vs SWIFT05062023.exe
                Source: SWIFT05062023.exeStatic PE information: invalid certificate
                Source: SWIFT05062023.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: SWIFT05062023.exeStatic PE information: Section: 5d)=X ZLIB complexity 1.00078125
                Source: SWIFT05062023.exeVirustotal: Detection: 22%
                Source: C:\Users\user\Desktop\SWIFT05062023.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\SWIFT05062023.exe C:\Users\user\Desktop\SWIFT05062023.exe
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\SWIFT05062023.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SWIFT05062023.exe.logJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@1/1
                Source: SWIFT05062023.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
                Source: C:\Users\user\Desktop\SWIFT05062023.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: SWIFT05062023.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: SWIFT05062023.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: SWIFT05062023.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: CEMENT.pdb source: SWIFT05062023.exe, 00000000.00000002.540183808.0000016F00077000.00000004.00000800.00020000.00000000.sdmp, SWIFT05062023.exe, 00000000.00000002.542043646.0000016F708F0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: NMkLiJJ.pdbBSJB source: SWIFT05062023.exe
                Source: Binary string: NMkLiJJ.pdb source: SWIFT05062023.exe
                Source: C:\Users\user\Desktop\SWIFT05062023.exeCode function: 0_2_0000016F705A57A4 pushfq ; ret
                Source: C:\Users\user\Desktop\SWIFT05062023.exeCode function: 0_2_00007FF816213754 pushad ; retf
                Source: C:\Users\user\Desktop\SWIFT05062023.exeCode function: 0_2_00007FF816216A84 pushfd ; ret
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeCode function: 1_2_0575B8A1 push es; ret
                Source: SWIFT05062023.exeStatic PE information: section name: 5d)=X
                Source: initial sampleStatic PE information: section name: 5d)=X entropy: 7.990624932753266
                Source: initial sampleStatic PE information: section name: .text entropy: 7.893170542920391
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\SWIFT05062023.exe TID: 6968Thread sleep time: -922337203685477s >= -30000s
                Source: C:\Users\user\Desktop\SWIFT05062023.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\SWIFT05062023.exeCode function: 0_2_00007FF816217740 sldt word ptr [eax]
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess information queried: ProcessInformation
                Source: C:\Users\user\Desktop\SWIFT05062023.exeThread delayed: delay time: 922337203685477
                Source: SWIFT05062023.exe, 00000000.00000002.540511718.0000016F11A3E000.00000004.00000800.00020000.00000000.sdmp, SWIFT05062023.exe, 00000000.00000002.540511718.0000016F11ADA000.00000004.00000800.00020000.00000000.sdmp, SWIFT05062023.exe, 00000000.00000002.540511718.0000016F11869000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ga/gEsFgYHGFsC
                Source: SWIFT05062023.exe, 00000000.00000002.540511718.0000016F11ADA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %hoMAAga/gEsFgYHGFsC
                Source: SWIFT05062023.exe, 00000000.00000002.540511718.0000016F11ADA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %hoMAAga/gEsFgYHGFsCBxhv5AAACh8QKOUAAAqcGwwACBz+ASwNBw
                Source: CasPol.exe, 00000001.00000002.803904437.000000000656A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeProcess token adjusted: Debug
                Source: C:\Users\user\Desktop\SWIFT05062023.exeMemory allocated: page read and write | page guard

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\SWIFT05062023.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000
                Source: C:\Users\user\Desktop\SWIFT05062023.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 402000
                Source: C:\Users\user\Desktop\SWIFT05062023.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 42C000
                Source: C:\Users\user\Desktop\SWIFT05062023.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 42E000
                Source: C:\Users\user\Desktop\SWIFT05062023.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 10E7008
                Source: C:\Users\user\Desktop\SWIFT05062023.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000 protect: page execute and read and write
                Source: C:\Users\user\Desktop\SWIFT05062023.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe base: 400000 value starts with: 4D5A
                Source: C:\Users\user\Desktop\SWIFT05062023.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe
                Source: C:\Users\user\Desktop\SWIFT05062023.exeQueries volume information: C:\Users\user\Desktop\SWIFT05062023.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                Source: C:\Users\user\Desktop\SWIFT05062023.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6952, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SWIFT05062023.exe.16f11dafe48.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.799972283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.540511718.0000016F11ADA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                Source: Yara matchFile source: 00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6952, type: MEMORYSTR
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: CasPol.exe PID: 6952, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.SWIFT05062023.exe.16f11dafe48.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.CasPol.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SWIFT05062023.exe.16f11dafe48.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.799972283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.540511718.0000016F11ADA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts121
                Windows Management Instrumentation
                Path Interception311
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                111
                Security Software Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium11
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Disable or Modify Tools
                1
                Credentials in Registry
                1
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                Exfiltration Over Bluetooth2
                Non-Application Layer Protocol
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)141
                Virtualization/Sandbox Evasion
                Security Account Manager141
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares1
                Data from Local System
                Automated Exfiltration13
                Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)311
                Process Injection
                NTDS1
                Remote System Discovery
                Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
                Obfuscated Files or Information
                LSA Secrets24
                System Information Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common3
                Software Packing
                Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SWIFT05062023.exe23%VirustotalBrowse
                SWIFT05062023.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://discord.com0%URL Reputationsafe
                http://discord.com0%URL Reputationsafe
                https://discord.com40%URL Reputationsafe
                https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLv0%Avira URL Cloudsafe
                https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr90%Avira URL Cloudsafe
                https://discord.comD80%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                discord.com
                162.159.137.232
                truetrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvX6trIkig77Yg2Nm1avTr9true
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://discord.comCasPol.exe, 00000001.00000002.800774951.00000000036A0000.00000004.00000800.00020000.00000000.sdmptrue
                  • URL Reputation: safe
                  unknown
                  https://cdn.discordapp.com/attachments/1114977416134279200/1115663130656251924/user-226546_2023-06-CasPol.exe, 00000001.00000002.800774951.0000000003754000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://discord.comCasPol.exe, 00000001.00000002.800774951.00000000036B7000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://discord.comD8CasPol.exe, 00000001.00000002.800774951.00000000036F8000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://discord.com/api/webhooks/1114977540709289984/k4SQohEZgHj3IRvaJBioKCVlTv-1sy0NPHEWl2GHdoz5JLvCasPol.exe, 00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmptrue
                    • Avira URL Cloud: safe
                    unknown
                    https://discord.com4CasPol.exe, 00000001.00000002.800774951.00000000036A0000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCasPol.exe, 00000001.00000002.800774951.00000000036A0000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://cdn.discordapp.com/attachments/1114977416134279200/1115663127888011334/user-226546_2023-06-CasPol.exe, 00000001.00000002.800774951.00000000036D7000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000001.00000002.800774951.00000000036D3000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://media.discordapp.net/attachments/1114977416134279200/1115663130656251924/user-226546_2023-0CasPol.exe, 00000001.00000002.800774951.0000000003754000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://media.discordapp.net/attachments/1114977416134279200/1115663127888011334/user-226546_2023-0CasPol.exe, 00000001.00000002.800774951.00000000036D7000.00000004.00000800.00020000.00000000.sdmp, CasPol.exe, 00000001.00000002.800774951.00000000036D3000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            162.159.137.232
                            discord.comUnited States
                            13335CLOUDFLARENETUStrue
                            Joe Sandbox Version:37.1.0 Beryl
                            Analysis ID:882717
                            Start date and time:2023-06-06 17:25:56 +02:00
                            Joe Sandbox Product:CloudBasic
                            Overall analysis duration:0h 9m 14s
                            Hypervisor based Inspection enabled:false
                            Report type:light
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                            Number of analysed new started processes analysed:4
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • HDC enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample file name:SWIFT05062023.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/2@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HDC Information:
                            • Successful, ratio: 12.7% (good quality ratio 7.6%)
                            • Quality average: 35.2%
                            • Quality standard deviation: 32.8%
                            HCA Information:
                            • Successful, ratio: 96%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): audiodg.exe, WMIADAP.exe
                            • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            No simulations
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Users\user\Desktop\SWIFT05062023.exe
                            File Type:CSV text
                            Category:dropped
                            Size (bytes):226
                            Entropy (8bit):5.354940450065058
                            Encrypted:false
                            SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2wlAsDZiIv:Q3La/KDLI4MWuPTxAIv
                            MD5:B10E37251C5B495643F331DB2EEC3394
                            SHA1:25A5FFE4C2554C2B9A7C2794C9FE215998871193
                            SHA-256:8A6B926C70F8DCFD915D68F167A1243B9DF7B9F642304F570CE584832D12102D
                            SHA-512:296BC182515900934AA96E996FC48B565B7857801A07FEFA0D3D1E0C165981B266B084E344DB5B53041D1171F9C6708B4EE0D444906391C4FC073BCC23B92C37
                            Malicious:true
                            Reputation:high, very likely benign file
                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..
                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                            File Type:SQLite 3.x database, last written using SQLite version 3038005, file counter 10, database pages 7, 1st free page 5, free pages 2, cookie 0x13, schema 4, UTF-8, version-valid-for 10
                            Category:dropped
                            Size (bytes):28672
                            Entropy (8bit):0.43613063485556663
                            Encrypted:false
                            SSDEEP:12:TLqlUIFnGP6Gkwtwhg4FdbXGwvfhowcFOaOmzdOtssh+bgc4Jp+FxOUwa5q0u9z3:TLqlj1czkwubXYFpFNYcw+6UwcYzHr
                            MD5:46076967A4692D6323BCBDAD8532DA6A
                            SHA1:A2C61F0EAECF8C2D126FCF82828808B78291E582
                            SHA-256:BFA77719DCA9C4C92B38BD8A23C9DD751B82DB0F21620E6937C4F97AECC5536B
                            SHA-512:B4C03F075B2E4DC527AD25B5D5788BE55D4CBCCA66002884CC75528FC57AF54C494B2219C726999E9A29C5AB05C789DB1412F4A01A8AC61726E2F7B785E77691
                            Malicious:false
                            Reputation:high, very likely benign file
                            Preview:SQLite format 3......@ ..........................................................................[5.........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.899151052069721
                            TrID:
                            • Win64 Executable GUI Net Framework (217006/5) 49.88%
                            • Win64 Executable GUI (202006/5) 46.43%
                            • Win64 Executable (generic) (12005/4) 2.76%
                            • Generic Win/DOS Executable (2004/3) 0.46%
                            • DOS Executable Generic (2002/1) 0.46%
                            File name:SWIFT05062023.exe
                            File size:217664
                            MD5:b7475f585b317b4cdb0f385f147e635d
                            SHA1:c88c9416ffc3d97ac9ed1aeed6558c6f1b610207
                            SHA256:46887ad939b1f8d5e6588548aef4ebcbb3e924df26efc74ee5ddcdad4a23ed20
                            SHA512:63b82be56196ddb78ad93dd766f13ec488cae0b7ef73b04ac8915a5a9718b5228288b2081b442fc00618da2aa85cb137ea1b37ed6c3cd2fbe398cd0d3b343577
                            SSDEEP:3072:7CNkuMjNMFLm5HLcWbMRtBpzAGpyycA8g4qEs95M/ZAB0BoAXgihJxP91fNWCs01:ZuAMlm9XbMBpznVrjEs9ilggCUhVvj5
                            TLSH:0D24DF8D7650B6EFC99BC4329AE81DA4FF6075BA430B0257A027159DDF4C687CF280B6
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....~d..............0......V................@...... .......................`............`...@......@............... .....
                            Icon Hash:90cececece8e8eb0
                            Entrypoint:0x400000
                            Entrypoint Section:
                            Digitally signed:true
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x647EDF17 [Tue Jun 6 07:24:07 2023 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:
                            Signature Valid:false
                            Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                            Signature Validation Error:The digital signature of the object did not verify
                            Error Number:-2146869232
                            Not Before, Not After
                            • 12/13/2021 1:00:00 AM 1/9/2025 12:59:59 AM
                            Subject Chain
                            • CN=philandro Software GmbH, O=philandro Software GmbH, L=Stuttgart, S=Baden-W\xfcrttemberg, C=DE
                            Version:3
                            Thumbprint MD5:EAE713DFC05244CF4301BF1C9F68B1BE
                            Thumbprint SHA-1:9CD1DDB78ED05282353B20CDFE8FA0A4FB6C1ECE
                            Thumbprint SHA-256:9D7620A4CEBA92370E8828B3CB1007AEFF63AB36A2CBE5F044FDDE14ABAB1EBF
                            Serial:0DBF152DEAF0B981A8A938D53F769DB8
                            Instruction
                            dec ebp
                            pop edx
                            nop
                            add byte ptr [ebx], al
                            add byte ptr [eax], al
                            add byte ptr [eax+eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x340000x596.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x30c000x4640
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x87180x1c.text
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x80000x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            5d)=X0x20000x4ebc0x5000False1.00078125COM executable for DOS7.990624932753266IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .text0x80000x2b0380x2b200False0.9324558423913043data7.893170542920391IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0x340000x5960x600False0.412109375data4.077724048266111IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountry
                            RT_VERSION0x340a00x30cdata
                            RT_MANIFEST0x343ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                            192.168.2.4162.159.137.232496954432851779 06/06/23-17:26:57.544403TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49695443192.168.2.4162.159.137.232
                            TimestampSource PortDest PortSource IPDest IP
                            Jun 6, 2023 17:26:57.192792892 CEST49695443192.168.2.4162.159.137.232
                            Jun 6, 2023 17:26:57.192887068 CEST44349695162.159.137.232192.168.2.4
                            Jun 6, 2023 17:26:57.193042040 CEST49695443192.168.2.4162.159.137.232
                            Jun 6, 2023 17:26:57.223968983 CEST49695443192.168.2.4162.159.137.232
                            Jun 6, 2023 17:26:57.224036932 CEST44349695162.159.137.232192.168.2.4
                            Jun 6, 2023 17:26:57.281002998 CEST44349695162.159.137.232192.168.2.4
                            Jun 6, 2023 17:26:57.285382986 CEST49695443192.168.2.4162.159.137.232
                            Jun 6, 2023 17:26:57.306180000 CEST49695443192.168.2.4162.159.137.232
                            Jun 6, 2023 17:26:57.306231976 CEST44349695162.159.137.232192.168.2.4
                            Jun 6, 2023 17:26:57.306657076 CEST44349695162.159.137.232192.168.2.4
                            Jun 6, 2023 17:26:57.348021030 CEST49695443192.168.2.4162.159.137.232
                            Jun 6, 2023 17:26:57.524627924 CEST49695443192.168.2.4162.159.137.232
                            Jun 6, 2023 17:26:57.543656111 CEST44349695162.159.137.232192.168.2.4
                            Jun 6, 2023 17:26:57.544289112 CEST49695443192.168.2.4162.159.137.232
                            Jun 6, 2023 17:26:57.588314056 CEST44349695162.159.137.232192.168.2.4
                            Jun 6, 2023 17:26:57.863557100 CEST44349695162.159.137.232192.168.2.4
                            Jun 6, 2023 17:26:57.863801003 CEST44349695162.159.137.232192.168.2.4
                            Jun 6, 2023 17:26:57.863918066 CEST49695443192.168.2.4162.159.137.232
                            Jun 6, 2023 17:26:57.867252111 CEST49695443192.168.2.4162.159.137.232
                            Jun 6, 2023 17:26:58.139624119 CEST49696443192.168.2.4162.159.137.232
                            Jun 6, 2023 17:26:58.139700890 CEST44349696162.159.137.232192.168.2.4
                            Jun 6, 2023 17:26:58.139810085 CEST49696443192.168.2.4162.159.137.232
                            Jun 6, 2023 17:26:58.140410900 CEST49696443192.168.2.4162.159.137.232
                            Jun 6, 2023 17:26:58.140458107 CEST44349696162.159.137.232192.168.2.4
                            Jun 6, 2023 17:26:58.182255030 CEST44349696162.159.137.232192.168.2.4
                            Jun 6, 2023 17:26:58.186325073 CEST49696443192.168.2.4162.159.137.232
                            Jun 6, 2023 17:26:58.186382055 CEST44349696162.159.137.232192.168.2.4
                            Jun 6, 2023 17:26:58.253760099 CEST44349696162.159.137.232192.168.2.4
                            Jun 6, 2023 17:26:58.254376888 CEST49696443192.168.2.4162.159.137.232
                            Jun 6, 2023 17:26:58.254411936 CEST44349696162.159.137.232192.168.2.4
                            Jun 6, 2023 17:26:58.518281937 CEST44349696162.159.137.232192.168.2.4
                            Jun 6, 2023 17:26:58.518502951 CEST44349696162.159.137.232192.168.2.4
                            Jun 6, 2023 17:26:58.518681049 CEST49696443192.168.2.4162.159.137.232
                            Jun 6, 2023 17:26:58.519684076 CEST49696443192.168.2.4162.159.137.232
                            TimestampSource PortDest PortSource IPDest IP
                            Jun 6, 2023 17:26:57.149080038 CEST5223953192.168.2.48.8.8.8
                            Jun 6, 2023 17:26:57.176099062 CEST53522398.8.8.8192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jun 6, 2023 17:26:57.149080038 CEST192.168.2.48.8.8.80x7d6aStandard query (0)discord.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jun 6, 2023 17:26:57.176099062 CEST8.8.8.8192.168.2.40x7d6aNo error (0)discord.com162.159.137.232A (IP address)IN (0x0001)false
                            Jun 6, 2023 17:26:57.176099062 CEST8.8.8.8192.168.2.40x7d6aNo error (0)discord.com162.159.136.232A (IP address)IN (0x0001)false
                            Jun 6, 2023 17:26:57.176099062 CEST8.8.8.8192.168.2.40x7d6aNo error (0)discord.com162.159.128.233A (IP address)IN (0x0001)false
                            Jun 6, 2023 17:26:57.176099062 CEST8.8.8.8192.168.2.40x7d6aNo error (0)discord.com162.159.135.232A (IP address)IN (0x0001)false
                            Jun 6, 2023 17:26:57.176099062 CEST8.8.8.8192.168.2.40x7d6aNo error (0)discord.com162.159.138.232A (IP address)IN (0x0001)false
                            • discord.com

                            Click to jump to process

                            Target ID:0
                            Start time:17:26:50
                            Start date:06/06/2023
                            Path:C:\Users\user\Desktop\SWIFT05062023.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Users\user\Desktop\SWIFT05062023.exe
                            Imagebase:0x16f705a0000
                            File size:217664 bytes
                            MD5 hash:B7475F585B317B4CDB0F385F147E635D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.540511718.0000016F11ADA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low

                            Target ID:1
                            Start time:17:26:51
                            Start date:06/06/2023
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe
                            Imagebase:0xe60000
                            File size:107624 bytes
                            MD5 hash:F866FC1C2E928779C7119353C3091F0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000002.799972283.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.800774951.0000000003641000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:moderate

                            No disassembly