Edit tour

Windows Analysis Report
Purchase Order #2024-030-AC2021,pdf.exe

Overview

General Information

Sample name:Purchase Order #2024-030-AC2021,pdf.exe
Analysis ID:1394337
MD5:f3eb861633087183e550abe76551801f
SHA1:4b97d4a0ce597cb4dd223b13f1551b5db7a02d26
SHA256:4e9356141c7e446794e4d4cfcde9187b2232d6c55a512f06be31c0fbab9ab80c
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected UAC Bypass using CMSTP
.NET source code contains potential unpacker
.NET source code contains process injector
.NET source code references suspicious native API functions
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample has a suspicious name (potential lure to open the executable)
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Tries to load missing DLLs
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • Purchase Order #2024-030-AC2021,pdf.exe (PID: 5712 cmdline: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe MD5: F3EB861633087183E550ABE76551801F)
    • CasPol.exe (PID: 5788 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe MD5: 914F728C04D3EDDD5FBA59420E74E56B)
    • AddInProcess32.exe (PID: 5444 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe MD5: 9827FF3CDF4B83F9C86354606736CA9C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{
  "Exfil Mode": "SMTP",
  "Port": "587",
  "Host": "smtp.ionos.com",
  "Username": "salesfire@emisafe.ae",
  "Password": "nM33@e$pe%gg786o"
}
SourceRuleDescriptionAuthorStrings
00000004.00000002.3259788358.0000000002BFE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.3259788358.0000000002C21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000004.00000002.3257225314.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000004.00000002.3257225314.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.2039148107.0000000004FB3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 13 entries
            SourceRuleDescriptionAuthorStrings
            4.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              4.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                4.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  4.2.AddInProcess32.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x341e1:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x34253:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x342dd:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x3436f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x343d9:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x3444b:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x344e1:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x34571:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 37 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 74.208.5.2, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe, Initiated: true, ProcessId: 5444, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49709
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: https://heygirlisheeverythingyouwantedinaman.com/get/65ce47b5a46777f9cb231540CuAvira URL Cloud: Label: malware
                    Source: https://heygirlisheeverythingyouwantedinaman.com/get/65ce47b5a46777f9cb231540Avira URL Cloud: Label: malware
                    Source: https://heygirlisheeverythingyouwantedinaman.comAvira URL Cloud: Label: malware
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "smtp.ionos.com", "Username": "salesfire@emisafe.ae", "Password": "nM33@e$pe%gg786o"}
                    Source: heygirlisheeverythingyouwantedinaman.comVirustotal: Detection: 11%Perma Link
                    Source: https://heygirlisheeverythingyouwantedinaman.comVirustotal: Detection: 5%Perma Link
                    Source: https://heygirlisheeverythingyouwantedinaman.com/get/65ce47b5a46777f9cb231540Virustotal: Detection: 14%Perma Link
                    Source: Purchase Order #2024-030-AC2021,pdf.exeReversingLabs: Detection: 34%
                    Source: Purchase Order #2024-030-AC2021,pdf.exeVirustotal: Detection: 68%Perma Link
                    Source: Purchase Order #2024-030-AC2021,pdf.exeJoe Sandbox ML: detected
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpackString decryptor: $%5'$:
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpackString decryptor: `R cvJW&H(D(WAG
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpackString decryptor: cSXU]QyT~SXU]LyTcSEU]QyIcSXU]QyTcSXU
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpackString decryptor: '6(=$7o
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpackString decryptor: vFCY,)-
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpackString decryptor: rUB]TYSE

                    Exploits

                    barindex
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2049839292.000000000935C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Purchase Order #2024-030-AC2021,pdf.exe PID: 5712, type: MEMORYSTR
                    Source: unknownHTTPS traffic detected: 172.67.190.93:443 -> 192.168.2.5:49706 version: TLS 1.2
                    Source: Purchase Order #2024-030-AC2021,pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\_RU\WeAreChmnet\WeGonnaDOIT\obj\Debug\WeGonnaDOIT.pdb source: Purchase Order #2024-030-AC2021,pdf.exe

                    Networking

                    barindex
                    Source: Yara matchFile source: 4.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.4275220.1.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.5:49709 -> 74.208.5.2:587
                    Source: global trafficHTTP traffic detected: GET /get/65ce47b5a46777f9cb231540 HTTP/1.1Host: heygirlisheeverythingyouwantedinaman.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                    Source: Joe Sandbox ViewIP Address: 172.67.190.93 172.67.190.93
                    Source: Joe Sandbox ViewASN Name: ONEANDONE-ASBrauerstrasse48DE ONEANDONE-ASBrauerstrasse48DE
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: ip-api.com
                    Source: global trafficTCP traffic: 192.168.2.5:49709 -> 74.208.5.2:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET /get/65ce47b5a46777f9cb231540 HTTP/1.1Host: heygirlisheeverythingyouwantedinaman.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: unknownDNS traffic detected: queries for: heygirlisheeverythingyouwantedinaman.com
                    Source: AddInProcess32.exe, 00000004.00000002.3259788358.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258172393.0000000000D59000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258759420.0000000000DCD000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258172393.0000000000D65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.geotrust.com/GeoTrustTLSRSACAG1.crt0
                    Source: AddInProcess32.exe, 00000004.00000002.3264891247.0000000005E63000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdp.geotrust.c4
                    Source: AddInProcess32.exe, 00000004.00000002.3259788358.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258172393.0000000000D59000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258759420.0000000000DCD000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258172393.0000000000D65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cdp.geotrust.com/GeoTrustTLSRSACAG1.crl0
                    Source: AddInProcess32.exe, 00000004.00000002.3259788358.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258172393.0000000000D59000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3264891247.0000000005E63000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258172393.0000000000D65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0=
                    Source: AddInProcess32.exe, 00000004.00000002.3259788358.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2039148107.0000000004239000.00000004.00000800.00020000.00000000.sdmp, Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2039148107.0000000004FB3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3259788358.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3257225314.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2049839292.000000000935C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://james.newtonking.com/projects/json
                    Source: AddInProcess32.exe, 00000004.00000002.3259788358.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258172393.0000000000D59000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3264891247.0000000005E63000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258172393.0000000000D65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0B
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2037028159.0000000003051000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3259788358.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: AddInProcess32.exe, 00000004.00000002.3259788358.0000000002C04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://smtp.ionos.com
                    Source: AddInProcess32.exe, 00000004.00000002.3259788358.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258172393.0000000000D59000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258759420.0000000000DCD000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258172393.0000000000D65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://status.geotrust.com0
                    Source: AddInProcess32.exe, 00000004.00000002.3259788358.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258172393.0000000000D59000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258759420.0000000000DCD000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258172393.0000000000D65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0v
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2039148107.0000000004239000.00000004.00000800.00020000.00000000.sdmp, Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2039148107.0000000004FB3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3257225314.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2037028159.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://heygirlisheeverythingyouwantedinaman.com
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2037028159.0000000003051000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://heygirlisheeverythingyouwantedinaman.com/get/65ce47b5a46777f9cb231540
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2035942363.00000000012A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://heygirlisheeverythingyouwantedinaman.com/get/65ce47b5a46777f9cb231540Cu
                    Source: AddInProcess32.exe, 00000004.00000002.3259788358.0000000002C04000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258172393.0000000000D59000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3264891247.0000000005E63000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3258172393.0000000000D65000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                    Source: unknownHTTPS traffic detected: 172.67.190.93:443 -> 192.168.2.5:49706 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpack, hxAF.cs.Net Code: i3iE6is4Y
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.4275220.1.raw.unpack, hxAF.cs.Net Code: i3iE6is4Y

                    System Summary

                    barindex
                    Source: 4.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.4275220.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.4275220.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                    Source: initial sampleStatic PE information: Filename: Purchase Order #2024-030-AC2021,pdf.exe
                    Source: Purchase Order #2024-030-AC2021,pdf.exeStatic file information: Suspicious name
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeCode function: 0_2_014CD5C4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_00CCA8B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_00CC4AC0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_00CC3EA8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_00CCEE60
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_00CC41F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_062EC480
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_062EB174
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_062EE290
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_062EAE4C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_06366690
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_0636B6D8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_0636C210
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_06365270
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_0636B2C0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_06363128
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_06367E20
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_06367740
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_0636E438
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_06362438
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_06360006
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_06360040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_0636597B
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000000.2010286322.0000000000C52000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWeGonnaDOIT.exe8 vs Purchase Order #2024-030-AC2021,pdf.exe
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2039148107.0000000004239000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec8c2ad0c-0f4e-428b-a14d-0a42ac8054b9.exe4 vs Purchase Order #2024-030-AC2021,pdf.exe
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2035942363.000000000126E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Purchase Order #2024-030-AC2021,pdf.exe
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2049839292.000000000935C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOfanepowamifovekucocu8 vs Purchase Order #2024-030-AC2021,pdf.exe
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2037028159.00000000030A4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamec8c2ad0c-0f4e-428b-a14d-0a42ac8054b9.exe4 vs Purchase Order #2024-030-AC2021,pdf.exe
                    Source: Purchase Order #2024-030-AC2021,pdf.exeBinary or memory string: OriginalFilenameWeGonnaDOIT.exe8 vs Purchase Order #2024-030-AC2021,pdf.exe
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: mscoree.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: apphelp.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: kernel.appcore.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: version.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: uxtheme.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: cryptsp.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: rsaenh.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: cryptbase.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: windows.storage.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: wldp.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: profapi.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: dwrite.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: amsi.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: userenv.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: iphlpapi.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: dnsapi.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: winnsi.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: rasapi32.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: rasman.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: rtutils.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: mswsock.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: winhttp.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: rasadhlp.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: fwpuclnt.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: secur32.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: sspicli.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: schannel.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: mskeyprotect.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: ntasn1.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: ncrypt.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: ncryptsslp.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: msasn1.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeSection loaded: gpapi.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mscoree.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: kernel.appcore.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: version.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vcruntime140_clr0400.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ucrtbase_clr0400.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: uxtheme.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: windows.storage.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wldp.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: profapi.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptsp.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rsaenh.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: cryptbase.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wbemcomn.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: amsi.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: userenv.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sspicli.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasapi32.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasman.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rtutils.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mswsock.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winhttp.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ondemandconnroutehelper.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc6.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dhcpcsvc.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dnsapi.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winnsi.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasadhlp.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: fwpuclnt.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: vaultcli.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wintypes.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: secur32.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: schannel.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mskeyprotect.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntasn1.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncrypt.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncryptsslp.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: msasn1.dll
                    Source: 4.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.4275220.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.4275220.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, SetLocalSignaturegetIsGenericTypeDefinition.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpack, N43UVggPg.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpack, N43UVggPg.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpack, Ow96S4wT.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpack, Ow96S4wT.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpack, Ow96S4wT.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpack, Ow96S4wT.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpack, MjzNdC.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpack, MjzNdC.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, ConcurrentCollectionSyncRootNotSupportedAsR8.csTask registration methods: 'TaskWaitMultiNullTaskCreateBillboard'
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.raw.unpack, ConcurrentCollectionSyncRootNotSupportedAsR8.csTask registration methods: 'TaskWaitMultiNullTaskCreateBillboard'
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.raw.unpack, SetLocalSignaturegetIsGenericTypeDefinition.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.raw.unpack, SetLocalSignaturegetIsGenericTypeDefinition.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, SetLocalSignaturegetIsGenericTypeDefinition.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, SetLocalSignaturegetIsGenericTypeDefinition.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, TaskCompletionSource1WithCancellation.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, TaskCompletionSource1WithCancellation.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.raw.unpack, TaskCompletionSource1WithCancellation.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.raw.unpack, TaskCompletionSource1WithCancellation.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@5/1@3/3
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Purchase Order #2024-030-AC2021,pdf.exe.logJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutant created: NULL
                    Source: Purchase Order #2024-030-AC2021,pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: Purchase Order #2024-030-AC2021,pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                    Source: Purchase Order #2024-030-AC2021,pdf.exeReversingLabs: Detection: 34%
                    Source: Purchase Order #2024-030-AC2021,pdf.exeVirustotal: Detection: 68%
                    Source: unknownProcess created: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\Profiles
                    Source: Purchase Order #2024-030-AC2021,pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: Purchase Order #2024-030-AC2021,pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Purchase Order #2024-030-AC2021,pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: C:\_RU\WeAreChmnet\WeGonnaDOIT\obj\Debug\WeGonnaDOIT.pdb source: Purchase Order #2024-030-AC2021,pdf.exe

                    Data Obfuscation

                    barindex
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, ConcurrentCollectionSyncRootNotSupportedAsR8.cs.Net Code: GetTimestampTaskAwaiter1
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.raw.unpack, ConcurrentCollectionSyncRootNotSupportedAsR8.cs.Net Code: GetTimestampTaskAwaiter1
                    Source: Purchase Order #2024-030-AC2021,pdf.exeStatic PE information: 0xBE695D8E [Thu Mar 26 06:17:50 2071 UTC]
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeCode function: 0_2_014CF170 push eax; iretd
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2049839292.000000000935C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Purchase Order #2024-030-AC2021,pdf.exe PID: 5712, type: MEMORYSTR
                    Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2039148107.0000000004239000.00000004.00000800.00020000.00000000.sdmp, Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2039148107.0000000004FB3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3257225314.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3259788358.0000000002BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2049839292.000000000935C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL/WINE_GET_UNIX_FILE_NAMEQEMU
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2049839292.000000000935C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLLUSER
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeMemory allocated: 14C0000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeMemory allocated: 3050000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeMemory allocated: 5050000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeMemory allocated: 8CA0000 memory reserve | memory write watch
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeMemory allocated: 9CA0000 memory reserve | memory write watch
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: CC0000 memory reserve | memory write watch
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 2BA0000 memory reserve | memory write watch
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMemory allocated: 28C0000 memory reserve | memory write watch
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_06363C7B rdtsc
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeWindow / User API: threadDelayed 874
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeWindow / User API: threadDelayed 1657
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 571
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 2763
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe TID: 4416Thread sleep time: -3689348814741908s >= -30000s
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe TID: 4416Thread sleep time: -100000s >= -30000s
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe TID: 4416Thread sleep time: -99874s >= -30000s
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe TID: 4416Thread sleep time: -99764s >= -30000s
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe TID: 4416Thread sleep time: -99656s >= -30000s
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe TID: 4416Thread sleep time: -99546s >= -30000s
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe TID: 4416Thread sleep time: -99411s >= -30000s
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe TID: 4416Thread sleep time: -99296s >= -30000s
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe TID: 4416Thread sleep time: -99187s >= -30000s
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe TID: 4416Thread sleep time: -99052s >= -30000s
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe TID: 4416Thread sleep time: -98909s >= -30000s
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe TID: 4416Thread sleep time: -98781s >= -30000s
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe TID: 4416Thread sleep time: -98671s >= -30000s
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe TID: 4416Thread sleep time: -98562s >= -30000s
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe TID: 2700Thread sleep time: -30000s >= -30000s
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe TID: 2260Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -6456360425798339s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -100000s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 1848Thread sleep count: 571 > 30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -99875s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 1848Thread sleep count: 2763 > 30
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -99765s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -99656s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -99546s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -99437s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -99328s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -99218s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -99109s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -98999s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -98890s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -98770s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -98656s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -98546s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -98437s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -98328s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -98218s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 320Thread sleep time: -922337203685477s >= -30000s
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeThread delayed: delay time: 922337203685477
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeThread delayed: delay time: 100000
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeThread delayed: delay time: 99874
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeThread delayed: delay time: 99764
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeThread delayed: delay time: 99656
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeThread delayed: delay time: 99546
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeThread delayed: delay time: 99411
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeThread delayed: delay time: 99296
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeThread delayed: delay time: 99187
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeThread delayed: delay time: 99052
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeThread delayed: delay time: 98909
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeThread delayed: delay time: 98781
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeThread delayed: delay time: 98671
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeThread delayed: delay time: 98562
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 100000
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99875
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99765
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99656
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99546
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99437
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99328
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99218
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 99109
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98999
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98890
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98770
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98656
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98546
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98437
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98328
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 98218
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeThread delayed: delay time: 922337203685477
                    Source: AddInProcess32.exe, 00000004.00000002.3259788358.0000000002BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2049839292.000000000935C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREESOFTWARE\VMware, Inc.\VMware Tools
                    Source: AddInProcess32.exe, 00000004.00000002.3259788358.0000000002BD1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2049839292.000000000935C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMwareVBoxARun using valid operating system
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2049839292.000000000935C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: kernel32.dll/wine_get_unix_file_nameQEMU
                    Source: AddInProcess32.exe, 00000004.00000002.3257225314.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: VMwareVBox
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2049839292.000000000935C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2049839292.000000000935C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VIRTUALBOXUSOFTWARE\Oracle\VirtualBox Guest Additions!noValueButYesKeySC:\WINDOWS\system32\drivers\VBoxMouse.sys
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2049839292.000000000935C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathKC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\OC:\WINDOWS\system32\drivers\vmmouse.sysMC:\WINDOWS\system32\drivers\vmhgfs.sys
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2036239525.000000000134A000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3264891247.0000000005E63000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess information queried: ProcessInformation

                    Anti Debugging

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_00CC70A0 CheckRemoteDebuggerPresent,
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess queried: DebugPort
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 4_2_06363C7B rdtsc
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess token adjusted: Debug
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess token adjusted: Debug
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeMemory allocated: page read and write | page guard

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, SetLocalSignaturegetIsGenericTypeDefinition.cs.Net Code: MemberNameFileAllocationInformation contains injection code
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.96b9860.2.raw.unpack, SetLocalSignaturegetIsGenericTypeDefinition.cs.Net Code: MemberNameFileAllocationInformation contains injection code
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, YateList.csReference to suspicious API methods: NativeMethodsH.GetProcAddress(moduleHandle, global::_003CModule_003E.ownedMemoryTryWriteUInt16BigEndian("CastHelpersShiftRightArithmeticRoundedAdd"))
                    Source: Purchase Order #2024-030-AC2021,pdf.exe, YateList.csReference to suspicious API methods: NativeMethodsH.VirtualProtect(procAddress, source.Length, 64u, out var oldProtect)
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, SetLocalSignaturegetIsGenericTypeDefinition.csReference to suspicious API methods: VirtualAllocEx(TryFormatInt32DXNNY.IsEvenIntegerReleaseAllResources, num2, writeTimeoutToTitleCase, 12288, 64)
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.9790c80.3.raw.unpack, SetLocalSignaturegetIsGenericTypeDefinition.csReference to suspicious API methods: NtWriteVirtualMemory(TryFormatInt32DXNNY.IsEvenIntegerReleaseAllResources, (IntPtr)num4, DXMNNKoreanLunisolarCalendar, createTypegetWaitingWriteCount, out var ShiftRightArithmeticRoundedgetCharSet)
                    Source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpack, oZQpaCyO4.csReference to suspicious API methods: sHbn6juxSv.OpenProcess(ZHKsyD.DuplicateHandle, bInheritHandle: true, (uint)gmSjiIkP2.ProcessID)
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeQueries volume information: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe VolumeInformation
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\netstandard\v4.0_2.0.0.0__cc7b13ffcd2ddd51\netstandard.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                    Source: C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 4.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.4275220.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.4275220.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.3259788358.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3259788358.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3257225314.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2039148107.0000000004FB3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3259788358.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2039148107.0000000004239000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Purchase Order #2024-030-AC2021,pdf.exe PID: 5712, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 5444, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                    Source: Yara matchFile source: 4.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.4275220.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.4275220.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.3257225314.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2039148107.0000000004FB3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3259788358.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2039148107.0000000004239000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Purchase Order #2024-030-AC2021,pdf.exe PID: 5712, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 5444, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 4.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.4275220.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.42b0a50.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.Purchase Order #2024-030-AC2021,pdf.exe.4275220.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000004.00000002.3259788358.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3259788358.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3257225314.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2039148107.0000000004FB3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.3259788358.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2039148107.0000000004239000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: Purchase Order #2024-030-AC2021,pdf.exe PID: 5712, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 5444, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    1
                    File and Directory Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts1
                    Native API
                    1
                    Scheduled Task/Job
                    111
                    Process Injection
                    1
                    Deobfuscate/Decode Files or Information
                    1
                    Input Capture
                    34
                    System Information Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain Accounts1
                    Scheduled Task/Job
                    Logon Script (Windows)1
                    Scheduled Task/Job
                    1
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    541
                    Security Software Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Software Packing
                    NTDS1
                    Process Discovery
                    Distributed Component Object Model1
                    Input Capture
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Timestomp
                    LSA Secrets261
                    Virtualization/Sandbox Evasion
                    SSHKeylogging13
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain Credentials1
                    Application Window Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Masquerading
                    DCSync1
                    System Network Configuration Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job261
                    Virtualization/Sandbox Evasion
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
                    Process Injection
                    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1394337 Sample: Purchase Order #2024-030-AC... Startdate: 19/02/2024 Architecture: WINDOWS Score: 100 17 smtp.ionos.com 2->17 19 ip-api.com 2->19 21 heygirlisheeverythingyouwantedinaman.com 2->21 29 Multi AV Scanner detection for domain / URL 2->29 31 Found malware configuration 2->31 33 Malicious sample detected (through community Yara rule) 2->33 35 15 other signatures 2->35 7 Purchase Order #2024-030-AC2021,pdf.exe 15 3 2->7         started        signatures3 process4 dnsIp5 23 heygirlisheeverythingyouwantedinaman.com 172.67.190.93, 443, 49706 CLOUDFLARENETUS United States 7->23 37 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->37 11 AddInProcess32.exe 14 2 7->11         started        15 CasPol.exe 7->15         started        signatures6 process7 dnsIp8 25 smtp.ionos.com 74.208.5.2, 49709, 587 ONEANDONE-ASBrauerstrasse48DE United States 11->25 27 ip-api.com 208.95.112.1, 49708, 80 TUT-ASUS United States 11->27 39 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->39 41 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 11->41 43 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 11->43 45 3 other signatures 11->45 signatures9

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    Purchase Order #2024-030-AC2021,pdf.exe34%ReversingLabsWin32.Trojan.Tnega
                    Purchase Order #2024-030-AC2021,pdf.exe68%VirustotalBrowse
                    Purchase Order #2024-030-AC2021,pdf.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    smtp.ionos.com1%VirustotalBrowse
                    heygirlisheeverythingyouwantedinaman.com12%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://james.newtonking.com/projects/json0%URL Reputationsafe
                    http://james.newtonking.com/projects/json0%URL Reputationsafe
                    http://smtp.ionos.com1%VirustotalBrowse
                    https://heygirlisheeverythingyouwantedinaman.com/get/65ce47b5a46777f9cb231540Cu100%Avira URL Cloudmalware
                    http://cdp.geotrust.c40%Avira URL Cloudsafe
                    https://heygirlisheeverythingyouwantedinaman.com/get/65ce47b5a46777f9cb231540100%Avira URL Cloudmalware
                    https://heygirlisheeverythingyouwantedinaman.com100%Avira URL Cloudmalware
                    http://smtp.ionos.com0%Avira URL Cloudsafe
                    https://heygirlisheeverythingyouwantedinaman.com5%VirustotalBrowse
                    https://heygirlisheeverythingyouwantedinaman.com/get/65ce47b5a46777f9cb23154014%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    smtp.ionos.com
                    74.208.5.2
                    truetrueunknown
                    ip-api.com
                    208.95.112.1
                    truefalse
                      high
                      heygirlisheeverythingyouwantedinaman.com
                      172.67.190.93
                      truefalseunknown
                      NameMaliciousAntivirus DetectionReputation
                      https://heygirlisheeverythingyouwantedinaman.com/get/65ce47b5a46777f9cb231540false
                      • 14%, Virustotal, Browse
                      • Avira URL Cloud: malware
                      unknown
                      http://ip-api.com/line/?fields=hostingfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://heygirlisheeverythingyouwantedinaman.com/get/65ce47b5a46777f9cb231540CuPurchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2035942363.00000000012A3000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://smtp.ionos.comAddInProcess32.exe, 00000004.00000002.3259788358.0000000002C04000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://account.dyn.com/Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2039148107.0000000004239000.00000004.00000800.00020000.00000000.sdmp, Purchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2039148107.0000000004FB3000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3257225314.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePurchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2037028159.0000000003051000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000004.00000002.3259788358.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://cdp.geotrust.c4AddInProcess32.exe, 00000004.00000002.3264891247.0000000005E63000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://james.newtonking.com/projects/jsonPurchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2049839292.000000000935C000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            • URL Reputation: safe
                            unknown
                            https://heygirlisheeverythingyouwantedinaman.comPurchase Order #2024-030-AC2021,pdf.exe, 00000000.00000002.2037028159.0000000003051000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 5%, Virustotal, Browse
                            • Avira URL Cloud: malware
                            unknown
                            http://ip-api.comAddInProcess32.exe, 00000004.00000002.3259788358.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              208.95.112.1
                              ip-api.comUnited States
                              53334TUT-ASUSfalse
                              172.67.190.93
                              heygirlisheeverythingyouwantedinaman.comUnited States
                              13335CLOUDFLARENETUSfalse
                              74.208.5.2
                              smtp.ionos.comUnited States
                              8560ONEANDONE-ASBrauerstrasse48DEtrue
                              Joe Sandbox version:40.0.0 Tourmaline
                              Analysis ID:1394337
                              Start date and time:2024-02-19 09:53:06 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 6m 23s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:7
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:Purchase Order #2024-030-AC2021,pdf.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.expl.evad.winEXE@5/1@3/3
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 98%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                              • TCP Packets have been reduced to 100
                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                              • Report size getting too big, too many NtDeviceIoControlFile calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              TimeTypeDescription
                              09:53:54API Interceptor14x Sleep call for process: Purchase Order #2024-030-AC2021,pdf.exe modified
                              09:53:57API Interceptor17x Sleep call for process: AddInProcess32.exe modified
                              No context
                              No context
                              No context
                              No context
                              No context
                              Process:C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1513
                              Entropy (8bit):5.350429166386848
                              Encrypted:false
                              SSDEEP:24:ML9Xyr4wE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4q4E4Tyu84j:MpicwHK5HKH1qHiYHKh3oPtHo6hAHKzH
                              MD5:465EFCC6D66470A531259A6D9417A6CB
                              SHA1:7CEB25C7612B289039BDE035469641A0B10D1C68
                              SHA-256:B48406D6C730A07C17712C21F925C30E16CE2715C52612AAC308CCE29351F440
                              SHA-512:B47E0979A658758A0F1B643EE3F85B92046B94B73AE0143341F985B7832D86E18158EE108BF5C6CBE9840EF50C0E9E33557685D9D0B165EE4A6576E41D6A8BA2
                              Malicious:false
                              Reputation:low
                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"netstandard, Version=2.0.0.0, Culture=neutral, PublicKeyToken=cc7b13ffcd2ddd51",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e08
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):5.440296696297883
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                              • Win32 Executable (generic) a (10002005/4) 49.78%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              • DOS Executable Generic (2002/1) 0.01%
                              File name:Purchase Order #2024-030-AC2021,pdf.exe
                              File size:26'112 bytes
                              MD5:f3eb861633087183e550abe76551801f
                              SHA1:4b97d4a0ce597cb4dd223b13f1551b5db7a02d26
                              SHA256:4e9356141c7e446794e4d4cfcde9187b2232d6c55a512f06be31c0fbab9ab80c
                              SHA512:2f9ee7321d45fe4d2af10e23789e0258008e2e6eaca6445855a28bfc4fa3557f8c94e3e58754a9999a76f3763b225bf87f016a2c3e3a1769db3742ea9547f5a8
                              SSDEEP:384:WnI2V8g892qoKLgiUda3SOj+66uXx9xf8zMA9kSjIPJmuklPTVxQ7J:WxV8g892XKNx3ptXnJmuaPTQ
                              TLSH:2CC22C0AA3D8833BC99F0FB7D9A6191027B9D656EF83E75D86CCB8721B333D141112A5
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....]i..........."...0.<Z..........6z... ........@.. ....................................`................................
                              Icon Hash:00928e8e8686b000
                              Entrypoint:0x407a36
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0xBE695D8E [Thu Mar 26 06:17:50 2071 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x79600x4a.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x5b6.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xa0000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x79aa0x38.text
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x5a3c0x5c0075379ab70858e6b5cc9e2217893cff85False0.48178498641304346data5.601267915521747IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rsrc0x80000x5b60x6003b6c35e12e4be6e6fd4f3ceadef6aa66False0.41796875data4.121194235215341IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0xa0000xc0x200561a7af5fe929713baecb880e7a4c206False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_VERSION0x80a00x32cdata0.4236453201970443
                              RT_MANIFEST0x83cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                              DLLImport
                              mscoree.dll_CorExeMain
                              • Total Packets: 42
                              • 443 (HTTPS)
                              • 53 (DNS)
                              TimestampSource PortDest PortSource IPDest IP
                              Feb 19, 2024 09:53:55.786500931 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:55.786555052 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:55.786634922 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:55.811161995 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:55.811197996 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.014812946 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.015022993 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.018618107 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.018630028 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.019089937 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.073853970 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.125669003 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.165908098 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.449342012 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.449400902 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.449429035 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.449448109 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.449460030 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.449472904 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.449498892 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.449523926 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.449557066 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.449572086 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.449609995 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.449645996 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.449652910 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.450335979 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.450356007 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.450387955 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.450393915 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.450432062 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.524158955 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.524210930 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.524250031 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.524272919 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.524271011 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.524297953 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.524327040 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.524333000 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.524379969 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.524384975 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.525031090 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.525070906 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.525079966 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.525088072 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.525114059 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.525125980 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.525131941 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.525172949 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.525177956 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.526022911 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.526045084 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.526062965 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.526071072 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.526093960 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.526115894 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.526118994 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.526125908 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.526173115 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.526770115 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.526808023 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.526817083 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.526822090 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.526896000 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.600133896 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.600178957 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.600203037 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.600224018 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.600236893 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.600250959 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.600285053 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.600682974 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.600728035 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.600739002 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.600776911 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.601588011 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.601619005 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.601639032 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.601644993 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.601691961 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.602289915 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.602334023 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.602396011 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.602442980 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.611901045 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.611958981 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.611985922 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.612029076 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.612819910 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.612865925 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.613121986 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.613168001 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.613784075 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.613830090 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.613873005 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.613917112 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.614554882 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.614600897 CET44349706172.67.190.93192.168.2.5
                              Feb 19, 2024 09:53:56.614607096 CET49706443192.168.2.5172.67.190.93
                              Feb 19, 2024 09:53:56.614615917 CET44349706172.67.190.93192.168.2.5
                              TimestampSource PortDest PortSource IPDest IP
                              Feb 19, 2024 09:53:55.630465031 CET5470753192.168.2.51.1.1.1
                              Feb 19, 2024 09:53:55.773751020 CET53547071.1.1.1192.168.2.5
                              Feb 19, 2024 09:53:57.837727070 CET5970153192.168.2.51.1.1.1
                              Feb 19, 2024 09:53:57.925973892 CET53597011.1.1.1192.168.2.5
                              Feb 19, 2024 09:53:58.969491959 CET5358353192.168.2.51.1.1.1
                              Feb 19, 2024 09:53:59.058597088 CET53535831.1.1.1192.168.2.5
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Feb 19, 2024 09:53:55.630465031 CET192.168.2.51.1.1.10x6508Standard query (0)heygirlisheeverythingyouwantedinaman.comA (IP address)IN (0x0001)false
                              Feb 19, 2024 09:53:57.837727070 CET192.168.2.51.1.1.10x5e0cStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                              Feb 19, 2024 09:53:58.969491959 CET192.168.2.51.1.1.10x11f0Standard query (0)smtp.ionos.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Feb 19, 2024 09:53:55.773751020 CET1.1.1.1192.168.2.50x6508No error (0)heygirlisheeverythingyouwantedinaman.com172.67.190.93A (IP address)IN (0x0001)false
                              Feb 19, 2024 09:53:55.773751020 CET1.1.1.1192.168.2.50x6508No error (0)heygirlisheeverythingyouwantedinaman.com104.21.57.121A (IP address)IN (0x0001)false
                              Feb 19, 2024 09:53:57.925973892 CET1.1.1.1192.168.2.50x5e0cNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                              Feb 19, 2024 09:53:59.058597088 CET1.1.1.1192.168.2.50x11f0No error (0)smtp.ionos.com74.208.5.2A (IP address)IN (0x0001)false
                              • heygirlisheeverythingyouwantedinaman.com
                              • ip-api.com
                              TimestampSource PortDest PortSource IPDest IPCommands
                              Feb 19, 2024 09:53:59.315932035 CET5874970974.208.5.2192.168.2.5220 perfora.net (mreueus002) Nemesis ESMTP Service ready
                              Feb 19, 2024 09:53:59.316338062 CET49709587192.168.2.574.208.5.2EHLO 114127
                              Feb 19, 2024 09:53:59.446036100 CET5874970974.208.5.2192.168.2.5250-perfora.net Hello 114127 [191.96.227.222]
                              250-8BITMIME
                              250-SIZE 140000000
                              250 STARTTLS
                              Feb 19, 2024 09:53:59.446304083 CET49709587192.168.2.574.208.5.2STARTTLS
                              Feb 19, 2024 09:53:59.573797941 CET5874970974.208.5.2192.168.2.5220 OK
                              Target ID:0
                              Start time:09:53:53
                              Start date:19/02/2024
                              Path:C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Users\user\Desktop\Purchase Order #2024-030-AC2021,pdf.exe
                              Imagebase:0xc50000
                              File size:26'112 bytes
                              MD5 hash:F3EB861633087183E550ABE76551801F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2039148107.0000000004FB3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2039148107.0000000004FB3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2039148107.0000000004239000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2039148107.0000000004239000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.2049839292.000000000935C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2049839292.000000000935C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:true

                              Target ID:3
                              Start time:09:53:55
                              Start date:19/02/2024
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
                              Imagebase:0x2a0000
                              File size:108'664 bytes
                              MD5 hash:914F728C04D3EDDD5FBA59420E74E56B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:4
                              Start time:09:53:55
                              Start date:19/02/2024
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                              Wow64 process (32bit):true
                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                              Imagebase:0x740000
                              File size:43'008 bytes
                              MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3259788358.0000000002BFE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3259788358.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3257225314.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3257225314.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3259788358.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3259788358.0000000002BD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:moderate
                              Has exited:false

                              No disassembly