Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe
Analysis ID:1390445
MD5:c9a36a7e0bf431dafe139b1cc18609ed
SHA1:4d77f0d31e994d3baeba164238634cadaf95fb77
SHA256:7e33dd313ed09a15c81af55ee0997031caa3da8fba8c31c3859bc95e52559ff3
Tags:exe
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Tries to harvest and steal browser information (history, passwords, etc)
Creates a process in suspended mode (likely to inject code)
Enables debug privileges
IP address seen in connection with other malware
May check the online IP address of the machine
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe (PID: 6348 cmdline: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe MD5: C9A36A7E0BF431DAFE139B1CC18609ED)
    • conhost.exe (PID: 6364 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • WMIC.exe (PID: 6908 cmdline: wmic cpu get name MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • WMIC.exe (PID: 6940 cmdline: wmic path win32_VideoController get name MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.1728106690.000000C00013A000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    Process Memory Space: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe PID: 6348JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeReversingLabs: Detection: 13%
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeVirustotal: Detection: 29%Perma Link
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
      Source: Joe Sandbox ViewIP Address: 34.117.186.192 34.117.186.192
      Source: unknownDNS query: name: ipinfo.io
      Source: unknownDNS query: name: ipinfo.io
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: ipinfo.ioUser-Agent: Go-http-client/1.1Accept-Encoding: gzip
      Source: unknownDNS traffic detected: queries for: ipinfo.io
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61A2F1000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://invalidkey4.dblookup
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00009C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ipinfo.ioHTTP/1.1HTTP/1.1I
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00009C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ipinfo.ioHTTP/1.1HTTP/1.1Ihttp/1.1http/1.1yipinfo.io:80HTTP_PROXYhttp_proYhttp_proxyhttp_prox
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drString found in binary or memory: https://duckduckgo.com/ac/?q=
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00016E000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000092000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000280000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/missingauth
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000092000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/missingauthreflect.Value.SetMapIndex
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000092000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://t.me/PSoftware
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000092000.00000004.00001000.00020000.00000000.sdmp, system.txt.0.drString found in binary or memory: https://t.me/Planet_Stealer
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drString found in binary or memory: https://www.ecosia.org/newtab/
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeSection loaded: samlib.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dllJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dllJump to behavior
      Source: classification engineClassification label: mal52.spyw.winEXE@6/10@1/1
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6364:120:WilError_03
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeFile created: C:\Users\user\AppData\Local\Temp\system.txtJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeFile opened: C:\Windows\system32\33d169ff311846526eb1290a1192115a6eb4dfb8b4315ebf59fa197f0d23311bAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000003.1727066764.00000195CB327000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000003.1727169115.00000195CB32C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734540213.00000195CB32F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT a11,a102 FROM nssPrivate;
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61AC5B000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000003.1727066764.00000195CB327000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000003.1727169115.00000195CB32C000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734540213.00000195CB32F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SELECT a11,a102 FROM nssPrivate;.
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61AC5B000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000168000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: select name, value FROM autofillselect name, value FROM autofillPRAGMA busy_timeout = 5000;PRAGMA locking_mode = %s;PRAGMA locking_mode = NORMAL;PRAGMA synchronous = NORMAL;C:\Users\userC:\Users\user\intentlauncher\launcherconfigC:\Users\user\.lunarclient\settings\game\accounts.jsonC:\Users\user\AppData\Roaming\.minecraft\TlauncherProfiles.jsonC:\Users\user\AppData\Roaming\.feather\accounts.jsonC:\Users\user\AppData\Roaming\.minecraft\meteor-client\C:\Users\user\AppData\Roaming\.minecraft\Impact\alts.jsonC:\Users\user\AppData\Roaming\.minecraft\Novoline\alts.novoC:\Users\user\AppData\Roaming\.minecraft\launcher_accounts_microsoft_store.jsonC:\Users\user\AppData\Roaming\.minecraft\C:\Users\user\AppData\Roaming\.minecraft\Rise\alts.txtC:\Users\user\intentlauncher\Rise\alts.txtC:\Users\user\AppData\Roaming\paladium-group\accounts.jsonC:\Users\user\AppData\Roaming\PolyMC\accounts.jsonC:\Users\user\AppData\Roaming\Badlion Client\accounts.jsonC:\Users\user\AppData\Local\Temp\exodus-passwords.txtC:\Users\user\AppData\Local\Temp\discord-tokens.txtkernel32.dll
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61AC5B000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61AC5B000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61AC5B000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO "%w"."%w"("%w") VALUES('integrity-check');
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1731478918.000000C000240000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cardsfqs92o4p.default-releasePRAGMA synchronous = NORMAL;;pData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000092000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000168000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: select name, value FROM autofillselect name, value FROM autofillPRAGMA busy_timeout = 5000;
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61AC5B000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61AC5B000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1731478918.000000C00020C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: SELECT item1, item2 FROM metadatPRAGMA busy_timeout = 5000;
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C00033B000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000003.1723561993.00000195CB335000.00000004.00000020.00020000.00000000.sdmp, qEyjW2Mb.dat.0.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61AC5B000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1731478918.000000C00020C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: SELECT a11,a102 FROM nssPrivate;SELECT a11,a102 FROM nssPrivate;
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeReversingLabs: Detection: 13%
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeVirustotal: Detection: 29%
      Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get name
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get nameJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get nameJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeStatic PE information: Image base 0x140000000 > 0x60000000
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeStatic file information: File size 4371968 > 1048576
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x42ae00
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeCode function: 0_3_00000195CAFE9398 pushad ; retf 0_3_00000195CAFE9399
      Source: initial sampleStatic PE information: section name: UPX0
      Source: initial sampleStatic PE information: section name: UPX1
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00009C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxservice
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxtrayvboxtrayvboxservice
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00007E000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxtrayvboxtraywmiprvse.exe
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxtrayvboxtraysgrmbroker.exe
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: winstore.app.exevmtoolsdy
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00009C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxserviceh
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00013A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: registryvmtoolsdregistryregistryvm3dservice
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: [system process]vboxtrayvboxtray[system process]vboxservice
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxtrayvboxtraysearchapp.exe
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00009C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmtoolsdy
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00013A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxtrayvboxtraysystem
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00013A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxtrayvboxtrayregistryvboxservice
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00007E000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00009C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxtrayvboxtrayjkbaorwnsqh.exe
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: [system process]vmtoolsdy
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00013A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OpenProcessFormatMessageWGetProcessTimesCloseHandleProcess32FirstWProcess32NextWSystemvmtoolsdsystemvm3dservicesystemyvboxtrayvboxtraysystemvboxserviceRegistryregistryvmtoolsdregistryregistryvm3dserviceyvboxtrayvboxtrayregistryvboxservicewininit.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicecsrss.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicewinlogon.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicesvchost.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicelsass.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicesvchost.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicesvchost.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicesvchost.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicedwm.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservicesvchost.exevmtoolsdyvm3dservicevboxtrayvboxtrayvboxservice
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00013A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmtoolsdsystem
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: winstore.app.exevboxtrayvboxtraywinstore.app.exevboxservice
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxtrayvboxtraydashost.exe
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00009C000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: jkbaorwnsqh.exevboxtrayvboxtrayjkbaorwnsqh.exevboxservicejkbaorwnsqh.exevmtoolsdyjkbaorwnsqh.exevm3dservicejkbaorwnsqh.exevboxtrayvboxtrayjkbaorwnsqh.exevboxservicejkbaorwnsqh.exevmtoolsdyjkbaorwnsqh.exevm3dservicejkbaorwnsqh.exevboxtrayvboxtrayjkbaorwnsqh.exevboxservicejkbaorwnsqh.exevmtoolsdyjkbaorwnsqh.exevm3dservicejkbaorwnsqh.exevboxtrayvboxtrayjkbaorwnsqh.exevboxservicejkbaorwnsqh.exevmtoolsdyjkbaorwnsqh.exevm3dservicejkbaorwnsqh.exevboxtrayvboxtrayjkbaorwnsqh.exevboxservicejkbaorwnsqh.exevmtoolsdyjkbaorwnsqh.exevm3dservicejkbaorwnsqh.exevboxtrayvboxtrayjkbaorwnsqh.exevboxservicejkbaorwnsqh.exevmtoolsdyjkbaorwnsqh.exevm3dservicejkbaorwnsqh.exevboxtrayvboxtrayjkbaorwnsqh.exevboxservicehRegOpenKeyExWMachineGuidRegCloseKeyNoDefaul.\wmicNoDefaultCurrentwmicwmicwmic.comwmic.exeCreateFileWCreateFileCreateFilewmic.batwmic.cmdCreateFileCreateFilewmic.vbswmic.vbeCreateFileCreateFilewmic.jswmic.jseCreateFileCreateFilewmic.wsfwmic.wshCreateFileCreateFilewmic.mscusernameCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileCreateFileNULCreatePipe=::=::\HOMEDRIVE=C:OS=Windows_NTuserprofileuserdomaintmptempsystemrootsystemdrivesessionnamepublicpathextpsmodulepathprogramw6432programfilesprogramdataprocessor_levelpathosonedrivelogonserverlocalappdatahomepathcomspechomedrivedriverdatacomputernameappdatawmic cpuallusersprofileSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTSYSTEMROOTwmic cpu get DuplicateHandleCreateProcessWCancelIoEx
      Source: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1733572042.00000195A3A33000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get nameJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get nameJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeQueries volume information: C:\Users\user\AppData\Local\Temp\qEyjW2Mb.dat VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeQueries volume information: C:\Users\user\AppData\Local\Temp\nPKJDroJ.dat VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeQueries volume information: C:\Users\user\AppData\Local\Temp\OnvHR2w6.dat VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeQueries volume information: C:\Users\user\AppData\Local\Temp\pROEk56G.dat VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Web Data VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeQueries volume information: C:\Users\user\AppData\Local\Temp\NCqkjQXI.dat VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BookmarksJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
      Source: Yara matchFile source: 00000000.00000002.1728106690.000000C00013A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe PID: 6348, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
      Windows Management Instrumentation
      1
      DLL Side-Loading
      11
      Process Injection
      1
      Virtualization/Sandbox Evasion
      1
      OS Credential Dumping
      11
      Security Software Discovery
      Remote Services1
      Data from Local System
      1
      Ingress Tool Transfer
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      11
      Process Injection
      LSASS Memory1
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable Media2
      Non-Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
      Obfuscated Files or Information
      Security Account Manager1
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive2
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Software Packing
      NTDS1
      System Network Configuration Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      DLL Side-Loading
      LSA Secrets13
      System Information Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe13%ReversingLabs
      SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe30%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://ipinfo.ioHTTP/1.1HTTP/1.1Ihttp/1.1http/1.1yipinfo.io:80HTTP_PROXYhttp_proYhttp_proxyhttp_prox0%Avira URL Cloudsafe
      http://ipinfo.ioHTTP/1.1HTTP/1.1I0%Avira URL Cloudsafe
      http://invalidkey4.dblookup0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      ipinfo.io
      34.117.186.192
      truefalse
        high
        NameMaliciousAntivirus DetectionReputation
        http://ipinfo.io/false
          high
          NameSourceMaliciousAntivirus DetectionReputation
          https://ac.ecosia.org/autocomplete?q=SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drfalse
            high
            https://duckduckgo.com/chrome_newtabSecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drfalse
              high
              https://ipinfo.io/missingauthSecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00016E000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000092000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000280000.00000004.00001000.00020000.00000000.sdmpfalse
                high
                https://duckduckgo.com/ac/?q=SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drfalse
                  high
                  https://www.google.com/images/branding/product/ico/googleg_lodp.icoSecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drfalse
                    high
                    http://ipinfo.ioHTTP/1.1HTTP/1.1Ihttp/1.1http/1.1yipinfo.io:80HTTP_PROXYhttp_proYhttp_proxyhttp_proxSecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00009C000.00000004.00001000.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchSecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drfalse
                      high
                      http://ipinfo.ioHTTP/1.1HTTP/1.1ISecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C00009C000.00000004.00001000.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drfalse
                        high
                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drfalse
                          high
                          https://t.me/Planet_StealerSecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000086000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000092000.00000004.00001000.00020000.00000000.sdmp, system.txt.0.drfalse
                            high
                            https://t.me/PSoftwareSecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000092000.00000004.00001000.00020000.00000000.sdmpfalse
                              high
                              https://www.ecosia.org/newtab/SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drfalse
                                high
                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000362000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1732392613.000000C000356000.00000004.00001000.00020000.00000000.sdmp, nPKJDroJ.dat.0.dr, e0qE9KyD.dat.0.drfalse
                                  high
                                  https://ipinfo.io/missingauthreflect.Value.SetMapIndexSecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1728106690.000000C000092000.00000004.00001000.00020000.00000000.sdmpfalse
                                    high
                                    http://invalidkey4.dblookupSecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, 00000000.00000002.1734668192.00007FF61A2F1000.00000040.00000001.01000000.00000003.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    34.117.186.192
                                    ipinfo.ioUnited States
                                    139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                    Joe Sandbox version:40.0.0 Tourmaline
                                    Analysis ID:1390445
                                    Start date and time:2024-02-11 21:28:08 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 4m 28s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:4
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe
                                    Detection:MAL
                                    Classification:mal52.spyw.winEXE@6/10@1/1
                                    EGA Information:Failed
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 0
                                    • Number of non-executed functions: 0
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Stop behavior analysis, all processes terminated
                                    • Execution Graph export aborted for target SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe, PID 6348 because there are no executed function
                                    • Not all processes where analyzed, report is missing behavior information
                                    TimeTypeDescription
                                    21:29:03API Interceptor2x Sleep call for process: WMIC.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    34.117.186.1925qgMqpI3O3.exeGet hashmaliciousXClient StealerBrowse
                                    • ipinfo.io/ip
                                    5qgMqpI3O3.exeGet hashmaliciousXClient StealerBrowse
                                    • ipinfo.io/ip
                                    9ndYaphcNr.exeGet hashmaliciousXClient StealerBrowse
                                    • ipinfo.io/ip
                                    9ndYaphcNr.exeGet hashmaliciousXClient StealerBrowse
                                    • ipinfo.io/ip
                                    KyRojfL3Fw.exeGet hashmaliciousUnknownBrowse
                                    • ipinfo.io/ip
                                    KyRojfL3Fw.exeGet hashmaliciousUnknownBrowse
                                    • ipinfo.io/ip
                                    Jtn7A24RWR.exeGet hashmaliciousUnknownBrowse
                                    • ipinfo.io/json
                                    Jtn7A24RWR.exeGet hashmaliciousUnknownBrowse
                                    • ipinfo.io/json
                                    QecR2L8QRt.exeGet hashmaliciousUnknownBrowse
                                    • ipinfo.io/json?token=5c76a674354e30
                                    QecR2L8QRt.exeGet hashmaliciousUnknownBrowse
                                    • ipinfo.io/json?token=5c76a674354e30
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    ipinfo.ioteai_demo.exeGet hashmaliciousUnknownBrowse
                                    • 34.117.186.192
                                    Spacetherapy.exeGet hashmaliciousUnknownBrowse
                                    • 34.117.186.192
                                    8vPg8GbGtV.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                    • 34.117.186.192
                                    file.exeGet hashmaliciousAmadey, RedLine, RisePro StealerBrowse
                                    • 34.117.186.192
                                    Planets Therapy.exeGet hashmaliciousUnknownBrowse
                                    • 34.117.186.192
                                    Planets Therapy.exeGet hashmaliciousUnknownBrowse
                                    • 34.117.186.192
                                    Bbd9GbGTz6.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RedLine, RisePro Stealer, XmrigBrowse
                                    • 34.117.186.192
                                    file.exeGet hashmaliciousRisePro StealerBrowse
                                    • 34.117.186.192
                                    file.exeGet hashmaliciousRisePro StealerBrowse
                                    • 34.117.186.192
                                    file.exeGet hashmaliciousRisePro StealerBrowse
                                    • 34.117.186.192
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    GOOGLE-AS-APGoogleAsiaPacificPteLtdSGSky Beta .exeGet hashmaliciousUnknownBrowse
                                    • 34.117.118.44
                                    teai_demo.exeGet hashmaliciousUnknownBrowse
                                    • 34.117.186.192
                                    Spacetherapy.exeGet hashmaliciousUnknownBrowse
                                    • 34.117.186.192
                                    fmoxN12Pdb.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                    • 34.117.188.166
                                    8vPg8GbGtV.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                    • 34.117.188.166
                                    file.exeGet hashmaliciousAmadey, RedLine, RisePro StealerBrowse
                                    • 34.117.186.192
                                    Planets Therapy.exeGet hashmaliciousUnknownBrowse
                                    • 34.117.186.192
                                    Planets Therapy.exeGet hashmaliciousUnknownBrowse
                                    • 34.117.186.192
                                    Bbd9GbGTz6.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RedLine, RisePro Stealer, XmrigBrowse
                                    • 34.117.186.192
                                    file.exeGet hashmaliciousRisePro StealerBrowse
                                    • 34.117.186.192
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe
                                    File Type:ASCII text, with very long lines (522)
                                    Category:dropped
                                    Size (bytes):3308
                                    Entropy (8bit):5.837392962472899
                                    Encrypted:false
                                    SSDEEP:96:jJfsoO2j8cRhAZFJaRJSztv3uGkyUBFn5s5HwPR2cvsdc:N5dRSRKeoP
                                    MD5:B19EC0DEAEE5949DE17ECF3443819B98
                                    SHA1:24EDD6FE835B6FF8C597A21A459E16016936C218
                                    SHA-256:0F11DDDE75E50C35CAE2D9BAB63282A352B878C134D5FB2BBDBE8A62570CB76E
                                    SHA-512:7EA513D2D9F96E63BB4D9DB0689FDD28BD47A98DD60E51B2A1C942FC71D195EF0C439FAE84838EF621CD0BE36D4C017369779DC3B329C73D38947E7F255D520D
                                    Malicious:false
                                    Reputation:low
                                    Preview:.google.com.TRUE./.FALSE.13356618603686193.NID.511=j8SQUTltnVU5cOAeyzqSxW-qHOakRuBHDQGLTGeceC9Z5rRzk5trMKb4CuZC_CFmc7KFwQcRJL-qGz8MvkkzMZmElvXAFWLO-TPZ9PMqBYA78ZAuaepnXIRHe-TAolVoW6Z7dQnqpgyX0m-TmS72bebAgoqZv5GkpRFUcZIw1Kk.support.microsoft.com.TRUE./.FALSE.13340887435186329..AspNetCore.AuthProvider.True.support.microsoft.com.TRUE./.FALSE.13340887735359381..AspNetCore.Correlation.mdRqPJxLbpyv7vX0eK9YkTR-xwcrW3VBLE4Y3HEvxuU.N.support.microsoft.com.TRUE./.FALSE.13340887735359334..AspNetCore.OpenIdConnect.Nonce.CfDJ8Kiuy_B5JgFMo7PeP95NLhqwcJ8koDy5pXkfoWsb5SbbU2hVCbsH2qt9GF_OVCqFkLEwhvzeADNQOF5RSmkDfh5RqfqlOkx5QWo4Lltvwb0CvwBFD8ujlm3BAglOeGca3ZatkLMUkHB6alahUr8qJ7G_3AejtooymTWCzyO89hshJeX8Gh78kohbIw0IQY4v6LZriT4P2fGeBSMjrvqODB4H_bs2nbfsSfL7aN-SiX4Yyn3iFo5fv-Rsj0cGE-FFrP1uXNT7Y1VSMOfm-L0RnS8.N.support.office.com.TRUE./.FALSE.13372509232238068.EXPID.8e067c40-5461-4aef-885f-2c92ce6a5474..microsoft.com.TRUE./.FALSE.13372422837017624.MC1.GUID=749eee6039c5489b9db3000c7ab3f399&HASH=749e&LV=202310
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                    Category:dropped
                                    Size (bytes):114688
                                    Entropy (8bit):0.9746603542602881
                                    Encrypted:false
                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                    Category:dropped
                                    Size (bytes):49152
                                    Entropy (8bit):0.8180424350137764
                                    Encrypted:false
                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                    MD5:349E6EB110E34A08924D92F6B334801D
                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                    Category:dropped
                                    Size (bytes):106496
                                    Entropy (8bit):1.1358696453229276
                                    Encrypted:false
                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
                                    Category:dropped
                                    Size (bytes):28672
                                    Entropy (8bit):2.5793180405395284
                                    Encrypted:false
                                    SSDEEP:96:/xealJiylsMjLslk5nYPphZEhcR2hO2mOeVgN8tmKqWkh3qzRk4PeOhZ3hcR1hOI:/xGZR8wbtxq5uWRHKloIN7YItnb6Ggz
                                    MD5:41EA9A4112F057AE6BA17E2838AEAC26
                                    SHA1:F2B389103BFD1A1A050C4857A995B09FEAFE8903
                                    SHA-256:CE84656EAEFC842355D668E7141F84383D3A0C819AE01B26A04F9021EF0AC9DB
                                    SHA-512:29E848AD16D458F81D8C4F4E288094B4CFC103AD99B4511ED1A4846542F9128736A87AAC5F4BFFBEFE7DF99A05EB230911EDCE99FEE3877DEC130C2781962103
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                    Category:dropped
                                    Size (bytes):106496
                                    Entropy (8bit):1.1358696453229276
                                    Encrypted:false
                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                    Category:dropped
                                    Size (bytes):114688
                                    Entropy (8bit):0.9746603542602881
                                    Encrypted:false
                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                    Malicious:false
                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe
                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                    Category:dropped
                                    Size (bytes):40960
                                    Entropy (8bit):0.8553638852307782
                                    Encrypted:false
                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                    Malicious:false
                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe
                                    File Type:ASCII text
                                    Category:dropped
                                    Size (bytes):514
                                    Entropy (8bit):4.796492444994601
                                    Encrypted:false
                                    SSDEEP:6:GkiLAMp3XhFHiAFQUhh2AFQ9WLrVE9/y6BThbXEzUwWc6Ju8n:0b3XTHP/h2oQ98ENTBhWWc6JBn
                                    MD5:5F7CDF12190E75006BA6CA3B56941905
                                    SHA1:399419A6109A477195033AE9F443A582C59A953D
                                    SHA-256:F47CDF3A25D3FE0B18F913613916742CAD2CA006801EF0BECC676CDF2560BFF8
                                    SHA-512:86110200DDCAB359271EB2A8019AA1B4B38327B7BA2B206386E34507CA1AEBE7278AC9E8673E7EAC2F67ED22489D3CD0FD181C5CA459C70615C7CDCE60FEFC2B
                                    Malicious:false
                                    Preview:. ,MMM8&&&....... _...MMMMM88&&&&..._.... .::'''MMMMM88&&&&&&'''::..... :: MMMMM88&&&&&& ::... '::....MMMMM88&&&&&&....::'... `''''MMMMM88&&&&'''''`.... 'MMM8&&&'.......[Planet Stealer: https://t.me/Planet_Stealer].. - IP: 81.181.57.74. - Country: US. - Username: user. - Hostname: user-PC. - Windows Version: Windows 10 Pro. - Hwid: 9e146be9-c76a-4720-bcdb-53011b87bd06. - CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz. - GPU: BLEZC8HK_.
                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe
                                    File Type:GLS_BINARY_LSB_FIRST
                                    Category:dropped
                                    Size (bytes):160
                                    Entropy (8bit):4.438743916256937
                                    Encrypted:false
                                    SSDEEP:3:rmHfvtH//STGlA1yqGlYUGk+ldyHGlgZty:rmHcKtGFlqty
                                    MD5:E467C82627F5E1524FDB4415AF19FC73
                                    SHA1:B86E3AA40E9FBED0494375A702EABAF1F2E56F8E
                                    SHA-256:116CD35961A2345CE210751D677600AADA539A66F046811FA70E1093E01F2540
                                    SHA-512:2A969893CC713D6388FDC768C009055BE1B35301A811A7E313D1AEEC1F75C88CCDDCD8308017A852093B1310811E90B9DA76B6330AACCF5982437D84F553183A
                                    Malicious:false
                                    Preview:................................xW4.4.....#Eg.......]..........+.H`........xW4.4.....#Eg......3.qq..7I......6........xW4.4.....#Eg......,..l..@E............
                                    File type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                    Entropy (8bit):7.927689440686909
                                    TrID:
                                    • UPX compressed Win32 Executable (30571/9) 65.62%
                                    • Win64 Executable (generic) (12005/4) 25.77%
                                    • Generic Win/DOS Executable (2004/3) 4.30%
                                    • DOS Executable Generic (2002/1) 4.30%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.02%
                                    File name:SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe
                                    File size:4'371'968 bytes
                                    MD5:c9a36a7e0bf431dafe139b1cc18609ed
                                    SHA1:4d77f0d31e994d3baeba164238634cadaf95fb77
                                    SHA256:7e33dd313ed09a15c81af55ee0997031caa3da8fba8c31c3859bc95e52559ff3
                                    SHA512:1cdc8cf07dc0b3d83d5f07e1de8bc60a9b5f0f568087f0cc740cc64492eb609e171c4f93eaad37abd9e4f018ed7983f2cdfe991309f6797572d9ee45fa0b8b96
                                    SSDEEP:98304:6PSzwcdHYUcyX4eHU0hU/cSuijBf1ULKPQ1w9VOO6GQgjIkU:WS0cJ59U0hUkx6f1g1w9CGQ2I
                                    TLSH:7A163387D022763AF4D4533CBA34590A7AA8507B5469E205491BC3ACD378CD2B3F67BB
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................$..B.........pj.........@..........................................`... ............................
                                    Icon Hash:90cececece8e8eb0
                                    Entrypoint:0x140c76a70
                                    Entrypoint Section:UPX1
                                    Digitally signed:false
                                    Imagebase:0x140000000
                                    Subsystem:windows cui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                    TLS Callbacks:0x40c76cc0, 0x1
                                    CLR (.Net) Version:
                                    OS Version Major:6
                                    OS Version Minor:1
                                    File Version Major:6
                                    File Version Minor:1
                                    Subsystem Version Major:6
                                    Subsystem Version Minor:1
                                    Import Hash:9aebf3da4677af9275c461261e5abde3
                                    Instruction
                                    push ebx
                                    push esi
                                    push edi
                                    push ebp
                                    dec eax
                                    lea esi, dword ptr [FFBD55AAh]
                                    dec eax
                                    lea edi, dword ptr [esi-0084B025h]
                                    dec eax
                                    lea eax, dword ptr [edi+00C4314Ch]
                                    push dword ptr [eax]
                                    mov dword ptr [eax], 82E71B5Eh
                                    push eax
                                    push edi
                                    xor ebx, ebx
                                    xor ecx, ecx
                                    dec eax
                                    or ebp, FFFFFFFFh
                                    call 00007F1B40FC4CB5h
                                    add ebx, ebx
                                    je 00007F1B40FC4C64h
                                    rep ret
                                    mov ebx, dword ptr [esi]
                                    dec eax
                                    sub esi, FFFFFFFCh
                                    adc ebx, ebx
                                    mov dl, byte ptr [esi]
                                    rep ret
                                    dec eax
                                    lea eax, dword ptr [edi+ebp]
                                    cmp ecx, 05h
                                    mov dl, byte ptr [eax]
                                    jbe 00007F1B40FC4C83h
                                    dec eax
                                    cmp ebp, FFFFFFFCh
                                    jnbe 00007F1B40FC4C7Dh
                                    sub ecx, 04h
                                    mov edx, dword ptr [eax]
                                    dec eax
                                    add eax, 04h
                                    sub ecx, 04h
                                    mov dword ptr [edi], edx
                                    dec eax
                                    lea edi, dword ptr [edi+04h]
                                    jnc 00007F1B40FC4C51h
                                    add ecx, 04h
                                    mov dl, byte ptr [eax]
                                    je 00007F1B40FC4C72h
                                    dec eax
                                    inc eax
                                    mov byte ptr [edi], dl
                                    sub ecx, 01h
                                    mov dl, byte ptr [eax]
                                    dec eax
                                    lea edi, dword ptr [edi+01h]
                                    jne 00007F1B40FC4C52h
                                    rep ret
                                    cld
                                    inc ecx
                                    pop ebx
                                    jmp 00007F1B40FC4C6Ah
                                    dec eax
                                    inc esi
                                    mov byte ptr [edi], dl
                                    dec eax
                                    inc edi
                                    mov dl, byte ptr [esi]
                                    add ebx, ebx
                                    jne 00007F1B40FC4C6Ch
                                    mov ebx, dword ptr [esi]
                                    dec eax
                                    sub esi, FFFFFFFCh
                                    adc ebx, ebx
                                    mov dl, byte ptr [esi]
                                    jc 00007F1B40FC4C48h
                                    lea eax, dword ptr [ecx+01h]
                                    jmp 00007F1B40FC4C69h
                                    dec eax
                                    inc ecx
                                    call ebx
                                    adc eax, eax
                                    inc ecx
                                    call ebx
                                    adc eax, eax
                                    add ebx, ebx
                                    jne 00007F1B40FC4C6Ch
                                    mov ebx, dword ptr [esi]
                                    dec eax
                                    sub esi, FFFFFFFCh
                                    adc ebx, ebx
                                    mov dl, byte ptr [esi]
                                    jnc 00007F1B40FC4C46h
                                    sub eax, 03h
                                    jc 00007F1B40FC4C7Bh
                                    shl eax, 08h
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0xc450000x159UPX1
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc774ec0xd0.rsrc
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc770000x4ec.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0xbcf0000x63e4UPX1
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xc775bc0x14.rsrc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0xc76ce80x28UPX1
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    UPX00x10000x84b0000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    UPX10x84c0000x42b0000x42ae0061da2d5b454b0681f9eca67a87c07a67unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0xc770000x10000x60086d4797b5a0b275e634ad1838d1bb959False0.419921875data5.1751574627310495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_MANIFEST0xc7705c0x48fXML 1.0 document, ASCII text0.40102827763496146
                                    DLLImport
                                    KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
                                    msvcrt.dllexit
                                    TimestampSource PortDest PortSource IPDest IP
                                    Feb 11, 2024 21:29:06.435049057 CET4973080192.168.2.434.117.186.192
                                    Feb 11, 2024 21:29:06.537482977 CET804973034.117.186.192192.168.2.4
                                    Feb 11, 2024 21:29:06.537815094 CET4973080192.168.2.434.117.186.192
                                    Feb 11, 2024 21:29:06.538331032 CET4973080192.168.2.434.117.186.192
                                    Feb 11, 2024 21:29:06.640691996 CET804973034.117.186.192192.168.2.4
                                    Feb 11, 2024 21:29:06.667196035 CET804973034.117.186.192192.168.2.4
                                    Feb 11, 2024 21:29:06.709777117 CET4973080192.168.2.434.117.186.192
                                    Feb 11, 2024 21:29:07.921459913 CET4973080192.168.2.434.117.186.192
                                    TimestampSource PortDest PortSource IPDest IP
                                    Feb 11, 2024 21:29:06.309216022 CET5944553192.168.2.41.1.1.1
                                    Feb 11, 2024 21:29:06.427495003 CET53594451.1.1.1192.168.2.4
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Feb 11, 2024 21:29:06.309216022 CET192.168.2.41.1.1.10x8bd0Standard query (0)ipinfo.ioA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Feb 11, 2024 21:29:06.427495003 CET1.1.1.1192.168.2.40x8bd0No error (0)ipinfo.io34.117.186.192A (IP address)IN (0x0001)false
                                    • ipinfo.io
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.44973034.117.186.192806348C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe
                                    TimestampBytes transferredDirectionData
                                    Feb 11, 2024 21:29:06.538331032 CET90OUTGET / HTTP/1.1
                                    Host: ipinfo.io
                                    User-Agent: Go-http-client/1.1
                                    Accept-Encoding: gzip
                                    Feb 11, 2024 21:29:06.667196035 CET693INHTTP/1.1 200 OK
                                    server: nginx/1.24.0
                                    date: Sun, 11 Feb 2024 20:29:06 GMT
                                    content-type: application/json; charset=utf-8
                                    Content-Length: 256
                                    access-control-allow-origin: *
                                    x-frame-options: SAMEORIGIN
                                    x-xss-protection: 1; mode=block
                                    x-content-type-options: nosniff
                                    referrer-policy: strict-origin-when-cross-origin
                                    x-envoy-upstream-service-time: 2
                                    via: 1.1 google
                                    strict-transport-security: max-age=2592000; includeSubDomains
                                    Data Raw: 7b 0a 20 20 22 69 70 22 3a 20 22 38 31 2e 31 38 31 2e 35 37 2e 37 34 22 2c 0a 20 20 22 63 69 74 79 22 3a 20 22 41 74 6c 61 6e 74 61 22 2c 0a 20 20 22 72 65 67 69 6f 6e 22 3a 20 22 47 65 6f 72 67 69 61 22 2c 0a 20 20 22 63 6f 75 6e 74 72 79 22 3a 20 22 55 53 22 2c 0a 20 20 22 6c 6f 63 22 3a 20 22 33 33 2e 37 34 39 30 2c 2d 38 34 2e 33 38 38 30 22 2c 0a 20 20 22 6f 72 67 22 3a 20 22 41 53 32 31 32 32 33 38 20 44 61 74 61 63 61 6d 70 20 4c 69 6d 69 74 65 64 22 2c 0a 20 20 22 70 6f 73 74 61 6c 22 3a 20 22 33 30 33 30 32 22 2c 0a 20 20 22 74 69 6d 65 7a 6f 6e 65 22 3a 20 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 0a 20 20 22 72 65 61 64 6d 65 22 3a 20 22 68 74 74 70 73 3a 2f 2f 69 70 69 6e 66 6f 2e 69 6f 2f 6d 69 73 73 69 6e 67 61 75 74 68 22 0a 7d
                                    Data Ascii: { "ip": "81.181.57.74", "city": "Atlanta", "region": "Georgia", "country": "US", "loc": "33.7490,-84.3880", "org": "AS212238 Datacamp Limited", "postal": "30302", "timezone": "America/New_York", "readme": "https://ipinfo.io/missingauth"}


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:21:29:00
                                    Start date:11/02/2024
                                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Trojan-PSW.Agent.26016.7220.exe
                                    Imagebase:0x7ff61a2f0000
                                    File size:4'371'968 bytes
                                    MD5 hash:C9A36A7E0BF431DAFE139B1CC18609ED
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:Go lang
                                    Yara matches:
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1728106690.000000C00013A000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:true

                                    Target ID:1
                                    Start time:21:29:00
                                    Start date:11/02/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:2
                                    Start time:21:29:03
                                    Start date:11/02/2024
                                    Path:C:\Windows\System32\wbem\WMIC.exe
                                    Wow64 process (32bit):false
                                    Commandline:wmic cpu get name
                                    Imagebase:0x7ff6c03b0000
                                    File size:576'000 bytes
                                    MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:3
                                    Start time:21:29:04
                                    Start date:11/02/2024
                                    Path:C:\Windows\System32\wbem\WMIC.exe
                                    Wow64 process (32bit):false
                                    Commandline:wmic path win32_VideoController get name
                                    Imagebase:0x7ff6c03b0000
                                    File size:576'000 bytes
                                    MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    No disassembly