Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
XX(1).exe

Overview

General Information

Sample name:XX(1).exe
Analysis ID:1467927
MD5:ceee05227b74e5a1e6d89f3b1cdfd24b
SHA1:7c7038b477f3d68226abf7eb1f8b4e9b9cfae331
SHA256:0f30bd5220de4c7fb2d426a392b5fcdbf1062b33a65761cb2af0d4732a2b2c2e
Infos:

Detection

AgentTesla, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected PureLog Stealer
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • XX(1).exe (PID: 7432 cmdline: "C:\Users\user\Desktop\XX(1).exe" MD5: CEEE05227B74E5A1E6D89F3B1CDFD24B)
    • RegSvcs.exe (PID: 7448 cmdline: "C:\Users\user\Desktop\XX(1).exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.magnatextile.com", "Username": "owais@magnatextile.com", "Password": "ow%{&}mti{&}$is"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x3f753:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x3f7c5:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x3f84f:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x3f8e1:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x3f94b:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x3f9bd:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x3fa53:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x3fae3:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 18 entries

          System Summary

          barindex
          Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 164.68.127.9, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 7448, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49731
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: XX(1).exe.7432.0.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.magnatextile.com", "Username": "owais@magnatextile.com", "Password": "ow%{&}mti{&}$is"}
          Source: XX(1).exeReversingLabs: Detection: 54%
          Source: XX(1).exeVirustotal: Detection: 28%Perma Link
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: XX(1).exeJoe Sandbox ML: detected
          Source: XX(1).exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2
          Source: Binary string: _.pdb source: RegSvcs.exe, 00000001.00000002.2884800788.0000000004411000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2883166588.000000000312F000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: XX(1).exe, 00000000.00000003.1642075192.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, XX(1).exe, 00000000.00000003.1642189183.0000000003D00000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: XX(1).exe, 00000000.00000003.1642075192.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, XX(1).exe, 00000000.00000003.1642189183.0000000003D00000.00000004.00001000.00020000.00000000.sdmp
          Source: global trafficTCP traffic: 192.168.2.4:49731 -> 164.68.127.9:587
          Source: Joe Sandbox ViewIP Address: 164.68.127.9 164.68.127.9
          Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
          Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
          Source: Joe Sandbox ViewASN Name: CONTABODE CONTABODE
          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
          Source: unknownDNS query: name: api.ipify.org
          Source: unknownDNS query: name: api.ipify.org
          Source: unknownDNS query: name: api.ipify.org
          Source: global trafficTCP traffic: 192.168.2.4:49731 -> 164.68.127.9:587
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: api.ipify.org
          Source: global trafficDNS traffic detected: DNS query: mail.magnatextile.com
          Source: RegSvcs.exe, 00000001.00000002.2886362238.0000000005DC2000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2883398358.0000000003497000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
          Source: RegSvcs.exe, 00000001.00000002.2886362238.0000000005DC2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
          Source: RegSvcs.exe, 00000001.00000002.2886362238.0000000005DC2000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2882367550.00000000014F8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2883398358.0000000003497000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
          Source: RegSvcs.exe, 00000001.00000002.2886362238.0000000005DC2000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2883398358.0000000003497000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl0
          Source: RegSvcs.exe, 00000001.00000002.2883398358.000000000348F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://magnatextile.com
          Source: RegSvcs.exe, 00000001.00000002.2883398358.000000000348F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.magnatextile.com
          Source: RegSvcs.exe, 00000001.00000002.2886362238.0000000005DC2000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2882367550.00000000014F8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2883398358.0000000003497000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
          Source: RegSvcs.exe, 00000001.00000002.2883398358.0000000003411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: RegSvcs.exe, 00000001.00000002.2884800788.0000000004411000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2883166588.000000000312F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
          Source: RegSvcs.exe, 00000001.00000002.2884800788.0000000004411000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2883166588.000000000312F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2883398358.0000000003411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
          Source: RegSvcs.exe, 00000001.00000002.2883398358.0000000003411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
          Source: RegSvcs.exe, 00000001.00000002.2883398358.0000000003411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
          Source: RegSvcs.exe, 00000001.00000002.2886362238.0000000005DC2000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2883398358.0000000003497000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
          Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.4:49730 version: TLS 1.2

          System Summary

          barindex
          Source: 00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
          Source: 00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
          Source: 00000000.00000002.1643879662.0000000003760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 00000001.00000002.2882112766.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: XX(1).exe, 00000000.00000002.1643106267.0000000000AA5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b1f7f9aa-d
          Source: XX(1).exe, 00000000.00000002.1643106267.0000000000AA5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_39e19b78-c
          Source: XX(1).exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7bd59caf-6
          Source: XX(1).exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_e925b12e-d
          Source: XX(1).exe, 00000000.00000003.1642538265.0000000003E2D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs XX(1).exe
          Source: XX(1).exe, 00000000.00000003.1640439920.0000000003C33000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs XX(1).exe
          Source: XX(1).exe, 00000000.00000002.1643879662.0000000003760000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename897bbe9e-ee7c-4e38-aaf9-090ed3100fb6.exe4 vs XX(1).exe
          Source: XX(1).exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: 00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
          Source: 00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
          Source: 00000000.00000002.1643879662.0000000003760000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 00000001.00000002.2882112766.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@2/2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
          Source: C:\Users\user\Desktop\XX(1).exeFile created: C:\Users\user\AppData\Local\Temp\autA32.tmpJump to behavior
          Source: XX(1).exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\XX(1).exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: XX(1).exeReversingLabs: Detection: 54%
          Source: XX(1).exeVirustotal: Detection: 28%
          Source: unknownProcess created: C:\Users\user\Desktop\XX(1).exe "C:\Users\user\Desktop\XX(1).exe"
          Source: C:\Users\user\Desktop\XX(1).exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\XX(1).exe"
          Source: C:\Users\user\Desktop\XX(1).exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\XX(1).exe"Jump to behavior
          Source: C:\Users\user\Desktop\XX(1).exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\XX(1).exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\XX(1).exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\XX(1).exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\XX(1).exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\XX(1).exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\XX(1).exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\XX(1).exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\XX(1).exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\XX(1).exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\XX(1).exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\XX(1).exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
          Source: XX(1).exeStatic file information: File size 1171456 > 1048576
          Source: XX(1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: XX(1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: XX(1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: XX(1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: XX(1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: XX(1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: XX(1).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: _.pdb source: RegSvcs.exe, 00000001.00000002.2884800788.0000000004411000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2883166588.000000000312F000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: XX(1).exe, 00000000.00000003.1642075192.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, XX(1).exe, 00000000.00000003.1642189183.0000000003D00000.00000004.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: XX(1).exe, 00000000.00000003.1642075192.0000000003B60000.00000004.00001000.00020000.00000000.sdmp, XX(1).exe, 00000000.00000003.1642189183.0000000003D00000.00000004.00001000.00020000.00000000.sdmp
          Source: XX(1).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: XX(1).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: XX(1).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: XX(1).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: XX(1).exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Users\user\Desktop\XX(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\XX(1).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
          Source: C:\Users\user\Desktop\XX(1).exeAPI/Special instruction interceptor: Address: 37532B4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4978Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 898Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99875Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99766Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99657Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99532Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99407Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99282Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99157Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99032Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98922Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98813Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98688Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98563Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98423Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98297Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98188Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98063Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97953Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97844Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97719Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97610Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97485Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97360Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97235Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97110Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96985Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96860Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96735Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96610Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: RegSvcs.exe, 00000001.00000002.2886362238.0000000005DC2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllj
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\XX(1).exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\XX(1).exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1162008Jump to behavior
          Source: C:\Users\user\Desktop\XX(1).exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\XX(1).exe"Jump to behavior
          Source: XX(1).exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2883398358.000000000348F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2883166588.000000000312F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2884800788.0000000004411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2883398358.0000000003464000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2883398358.0000000003497000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2883398358.00000000034A3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7448, type: MEMORYSTR
          Source: Yara matchFile source: 00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2883166588.000000000312F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2884800788.0000000004411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
          Source: Yara matchFile source: 00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2883166588.000000000312F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2884800788.0000000004411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2883398358.0000000003464000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7448, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2883398358.000000000348F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2883166588.000000000312F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2884800788.0000000004411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2883398358.0000000003464000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2883398358.0000000003497000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2883398358.00000000034A3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7448, type: MEMORYSTR
          Source: Yara matchFile source: 00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2883166588.000000000312F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000001.00000002.2884800788.0000000004411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
          Windows Management Instrumentation
          1
          DLL Side-Loading
          212
          Process Injection
          1
          Disable or Modify Tools
          2
          OS Credential Dumping
          211
          Security Software Discovery
          Remote Services1
          Email Collection
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          121
          Virtualization/Sandbox Evasion
          1
          Credentials in Registry
          1
          Process Discovery
          Remote Desktop Protocol2
          Data from Local System
          1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)212
          Process Injection
          Security Account Manager121
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive1
          Ingress Tool Transfer
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          DLL Side-Loading
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture2
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
          System Network Configuration Discovery
          SSHKeylogging23
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
          File and Directory Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync124
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          XX(1).exe54%ReversingLabsWin32.Trojan.Strab
          XX(1).exe29%VirustotalBrowse
          XX(1).exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          api.ipify.org0%VirustotalBrowse
          magnatextile.com0%VirustotalBrowse
          mail.magnatextile.com0%VirustotalBrowse
          SourceDetectionScannerLabelLink
          https://api.ipify.org/0%URL Reputationsafe
          https://api.ipify.org0%URL Reputationsafe
          https://sectigo.com/CPS00%URL Reputationsafe
          https://account.dyn.com/0%URL Reputationsafe
          https://account.dyn.com/0%URL Reputationsafe
          https://api.ipify.org/t0%URL Reputationsafe
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
          http://magnatextile.com0%Avira URL Cloudsafe
          http://mail.magnatextile.com0%Avira URL Cloudsafe
          http://magnatextile.com0%VirustotalBrowse
          http://mail.magnatextile.com0%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          api.ipify.org
          172.67.74.152
          truefalseunknown
          magnatextile.com
          164.68.127.9
          truetrueunknown
          mail.magnatextile.com
          unknown
          unknowntrueunknown
          NameMaliciousAntivirus DetectionReputation
          https://api.ipify.org/false
          • URL Reputation: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://api.ipify.orgRegSvcs.exe, 00000001.00000002.2884800788.0000000004411000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2883166588.000000000312F000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2883398358.0000000003411000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://sectigo.com/CPS0RegSvcs.exe, 00000001.00000002.2886362238.0000000005DC2000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2883398358.0000000003497000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://account.dyn.com/RegSvcs.exe, 00000001.00000002.2884800788.0000000004411000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2883166588.000000000312F000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          https://api.ipify.org/tRegSvcs.exe, 00000001.00000002.2883398358.0000000003411000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.2883398358.0000000003411000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://magnatextile.comRegSvcs.exe, 00000001.00000002.2883398358.000000000348F000.00000004.00000800.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://mail.magnatextile.comRegSvcs.exe, 00000001.00000002.2883398358.000000000348F000.00000004.00000800.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          164.68.127.9
          magnatextile.comGermany
          51167CONTABODEtrue
          172.67.74.152
          api.ipify.orgUnited States
          13335CLOUDFLARENETUSfalse
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1467927
          Start date and time:2024-07-05 03:37:42 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 3s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:7
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:XX(1).exe
          Detection:MAL
          Classification:mal100.troj.spyw.evad.winEXE@3/4@2/2
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          TimeTypeDescription
          21:38:31API Interceptor29x Sleep call for process: RegSvcs.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          164.68.127.9rnoahcrypter.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
            New Orders 116403.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
              493084369.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                z1chima.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                  Purchase Order 0030520574.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    Purchase Order 0030520574.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                      PO-2024-05369.exeGet hashmaliciousAgentTeslaBrowse
                        grace.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          vXykLXCs5d.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            ET2431000075 & ET2431000076.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              172.67.74.152242764.exeGet hashmaliciousFicker Stealer, Rusty StealerBrowse
                              • api.ipify.org/?format=wef
                              K8mzlntJVN.msiGet hashmaliciousUnknownBrowse
                              • api.ipify.org/
                              stub.exeGet hashmaliciousUnknownBrowse
                              • api.ipify.org/
                              stub.exeGet hashmaliciousUnknownBrowse
                              • api.ipify.org/
                              Sonic-Glyder.exeGet hashmaliciousStealitBrowse
                              • api.ipify.org/?format=json
                              Sky-Beta.exeGet hashmaliciousUnknownBrowse
                              • api.ipify.org/?format=json
                              Sky-Beta.exeGet hashmaliciousUnknownBrowse
                              • api.ipify.org/?format=json
                              Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
                              • api.ipify.org/?format=json
                              Sky-Beta.exeGet hashmaliciousStealitBrowse
                              • api.ipify.org/?format=json
                              SongOfVikings.exeGet hashmaliciousUnknownBrowse
                              • api.ipify.org/?format=json
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              api.ipify.orgShip Docs_CI PL HBL COO_.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.12.205
                              M.V TBN - VESSEL'S DETAILS.docx.scr.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.13.205
                              0001.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 172.67.74.152
                              Zz3h8cOX1E.exeGet hashmaliciousQuasarBrowse
                              • 104.26.13.205
                              Luciana Alvarez CV.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.13.205
                              Acal BFi UK - Products List 020240704.exeGet hashmaliciousAgentTesla, RedLine, StormKitty, XWormBrowse
                              • 172.67.74.152
                              z4XlS0wTQM.exeGet hashmaliciousQuasarBrowse
                              • 104.26.12.205
                              Zz3h8cOX1E.exeGet hashmaliciousQuasarBrowse
                              • 104.26.13.205
                              5gO02Ijl9V.exeGet hashmaliciousGuLoaderBrowse
                              • 104.26.12.205
                              0NJYTCJYLo.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 104.26.13.205
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              CONTABODEMcrflHf6vg.exeGet hashmaliciousWhiteSnake StealerBrowse
                              • 167.86.115.218
                              rnoahcrypter.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 164.68.127.9
                              https://link.mail.beehiiv.com/ls/click?upn=u001.DTQiLe1mLQCNek4IXPrb3VfkDRZqOjfShPTiZjGkXYeHH0qcNkYwSSCzibjlmAzeTFQugAGktmmDcLaGVd7xmrhViuDlzvk7LSYra0CxW0GfjPradQJiCp1Lv1-2BJr8tU4uPUlMdZtOopAucgMUwgTsNkjDwJaQiHNbOIjuz9-2F3lablcjJiJu79900Z-2B-2BB-2F6jXyiW_VW5ZEdFpCuXmC2nf4fwMfiBmdui0O95PSMmp4s-2F2oS3jvSHISWr6XQl8RtHpD7TWmHpRBlT8NsCamUZaroeFibjayeskXeuNnFhPFOon1-2FD6SmbcpIEUC7jghzzXsggajKIODB16RJEeGNz4SFHe6mT-2Bn59v08ju13fD9NtKJQcr97qiQNjiGiaoQJcvN3gUurUBqLZp9I4f9bNW54ZUVVCzpwaogbLaWcL9oScbt8pPuOyTauAJYwyhhj24yBhp7RMjj-2F0GEsPKyiUipvQjkQHl7wMea8EX-2BEwxs5CkLSgKbIS5ztD-2FRjTIduXCBnVT1QnOLd-2FvmyGT6B7reFiJd8Uxm5bV4XvIh0yb5H69DRSKW3EikbmS1X801NApBjBxNojnvbDZeuwCzdsxI3Q5aBPTHO4KAIPr3eArcRNMGEhsEzfjMMKf-2F6jodzrXKEkXK5P-2Fd4Xgx-2FJIzg1wpgwJNw-3D-3D#?email=c3BlbmNlci53dW5kZXJsZUBoc2Nwb2x5LmNvbQ==Get hashmaliciousFake Captcha, HTMLPhisherBrowse
                              • 173.249.54.85
                              New Orders 116403.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 164.68.127.9
                              ABSA NOTIFICATION(.......pdfGet hashmaliciousHTMLPhisherBrowse
                              • 167.86.118.58
                              CUfSSHbXry.elfGet hashmaliciousMiraiBrowse
                              • 173.249.34.252
                              Ak1kDlyIZ8.elfGet hashmaliciousMiraiBrowse
                              • 173.249.34.252
                              a6pLyc70Eg.elfGet hashmaliciousMiraiBrowse
                              • 173.249.34.252
                              oG1PQhYd2k.elfGet hashmaliciousMiraiBrowse
                              • 173.249.34.252
                              YUjTZrUbFo.elfGet hashmaliciousMiraiBrowse
                              • 173.249.34.252
                              CLOUDFLARENETUSOVER DUE INVOICE PAYMENT.docxGet hashmaliciousSnake KeyloggerBrowse
                              • 188.114.96.3
                              https://m.exactag.com/ai.aspx?tc=d9912543bc40b07205bbd26a23a8d2e6b6b4f9&url=http%253AW0S.sdscondo.com/index.xml%23?email=cGV0ZXIuYnJvd24yM0Bxci5jb20uYXU=Get hashmaliciousHTMLPhisherBrowse
                              • 104.17.2.184
                              Ship Docs_CI PL HBL COO_.exeGet hashmaliciousAgentTeslaBrowse
                              • 104.26.12.205
                              https://rb.gy/zsqpjaGet hashmaliciousHTMLPhisherBrowse
                              • 104.17.2.184
                              https://singingfiles.com/show.php?l=0&u=2156442&id=64574Get hashmaliciousUnknownBrowse
                              • 188.114.97.3
                              http://business.ifbsmetaiidentiityconfirms.com/meta-community-standard100068928266341/Get hashmaliciousHTMLPhisherBrowse
                              • 188.114.97.3
                              http://services.business-manange.com/Get hashmaliciousHTMLPhisherBrowse
                              • 172.67.138.117
                              http://pub-2e7429ed1f544f43a4684eeceb978dbb.r2.dev/home.htmlGet hashmaliciousHTMLPhisherBrowse
                              • 104.18.2.35
                              http://helpdesk-advertising-review-id-9865133.d3m7n55z273utf.amplifyapp.com/index.htmlGet hashmaliciousUnknownBrowse
                              • 104.26.8.44
                              http://www.anuihafw369.xyz/m/register/Get hashmaliciousUnknownBrowse
                              • 104.17.24.14
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              3b5074b1b5d032e5620f69f9f700ff0eShip Docs_CI PL HBL COO_.exeGet hashmaliciousAgentTeslaBrowse
                              • 172.67.74.152
                              https://singingfiles.com/show.php?l=0&u=2156442&id=64574Get hashmaliciousUnknownBrowse
                              • 172.67.74.152
                              https://sula.starladeroff.com/Get hashmaliciousUnknownBrowse
                              • 172.67.74.152
                              http://business.ifbsmetaiidentiityconfirms.com/meta-community-standard100068928266341/Get hashmaliciousHTMLPhisherBrowse
                              • 172.67.74.152
                              http://helpdesk-advertising-review-id-9865133.d3m7n55z273utf.amplifyapp.com/index.htmlGet hashmaliciousUnknownBrowse
                              • 172.67.74.152
                              https://pub-9445ce0d74714d1c934c51ffcf83c3f2.r2.dev/slnt.html?nycsbsGet hashmaliciousHTMLPhisherBrowse
                              • 172.67.74.152
                              https://pradeeprunner.com/auth.htmlGet hashmaliciousUnknownBrowse
                              • 172.67.74.152
                              https://iwahadxi.hosted.phplist.com/lists/lt.php/?tid=eU1SAFEEUlZTABhUAVAGGAZWVFsfXVQLWkkDBQIAUAwCAgcAAldPWwdaBlNRVAgYVwEEXh9QClxcSQcAUlcbWgQGAAJVVwRXBAoBSQcBAVALVA8LHwIEXVtJUg8GVxsAVVMHGA5SB1EBC1YDAQQBDAGet hashmaliciousUnknownBrowse
                              • 172.67.74.152
                              http://multichaindappsx.pages.dev/Get hashmaliciousUnknownBrowse
                              • 172.67.74.152
                              http://sp.26skins.com/steamstore/category/science_fiction/?snr=1_category_4_multiplayeronlinecompetitive_12Get hashmaliciousUnknownBrowse
                              • 172.67.74.152
                              No context
                              Process:C:\Users\user\Desktop\XX(1).exe
                              File Type:ASCII text, with very long lines (29780), with no line terminators
                              Category:dropped
                              Size (bytes):29780
                              Entropy (8bit):3.5533246585729676
                              Encrypted:false
                              SSDEEP:768:miTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbn+Ig6Qm4vfF3if6gyX/:miTZ+2QoioGRk6ZklputwjpjBkCiw2R6
                              MD5:C69C6D214EC49C4C68377B0019AC496C
                              SHA1:4A15CC347E6C1D934D2FE7F99DFF58E6F905DAA7
                              SHA-256:0F9682BD5BE8238C6A09608304309409C24BA3F663A2D72625FDEE0A173C6AE6
                              SHA-512:5F8D4E0CD08B184A99CEEBA7A6C22EDB42708DC12EBF8B37B6F9D1861B2093EA3E35BE08A153724C96FE824F8B98FBC72124A6D592C27E0811769F19CAD8569B
                              Malicious:false
                              Reputation:low
                              Preview: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
                              Process:C:\Users\user\Desktop\XX(1).exe
                              File Type:data
                              Category:dropped
                              Size (bytes):268288
                              Entropy (8bit):7.906714483935363
                              Encrypted:false
                              SSDEEP:6144:DR95YCHlkpYPvkUvBxZnICQxQ3ha7S/6yV9y:jH8VQnxQx6JV9y
                              MD5:0627D8EA9C9A86C685642A0CADA49435
                              SHA1:14B98255BFDB171DD4C4493DBF37A9599750AA06
                              SHA-256:E79B150EC9F056E0DEBFAA6377C5B496E17A2AFB00418BC417F9AD3706FF1787
                              SHA-512:26EF50CCFAAE562F0F0833BF06B5E2BE09082CE78E4900D47DC9552DE4F897FD02E4510550FEA1B8BAB819BDA15DEBC63619CA341D1F9CA7386E3C5D1640934C
                              Malicious:false
                              Reputation:low
                              Preview:.n.LQ2ABJYPQ..0P.2EA5UFMvG9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30.45L\-.LN.Y.e.1....)\&f=D(^<R]mWT"<]5b,<p#1Z.94...fu+"R".C>:i45LR2AB&I.|hE..vC.?.$.3.dF0.A.J>..Lj3.'| .Jl!.Lwb[+Z<.9.mZN.E.2`.:<c(./.]S8vC.?5UFM6G9N30M45LR2.:.?PQD4`.Z2.@1U2.6.9N30M45L.2bCEXYQD.1PZNGA5UFM..9N3 M45.S2AB.YPAD40RZ2@A5UFM6G<N30M45LRREBN]PQ..2PX2E.5UVM6W9N30]45\R2ABNY@QD40PZ2EA5U.X4GiN30MT7L^.@BNYPQD40PZ2EA5UFM6G9N30M4..S2]BNYPQD40PZ2EA5UFM6G9N30M45L.?CB.YPQD40PZ2EA5.GM.F9N30M45LR2ABNYPQD40PZ2EA5Uh9S?MN30U.4LR"ABN.QQD00PZ2EA5UFM6G9N.0MT.>6S5#NY.<D40.[2E/5UF.7G9N30M45LR2AB.YP.jPQ$;2EA.eFM6g;N3&M45FP2ABNYPQD40PZ2.A5.h?E5ZN30A.4LRRCBN.QQD.2PZ2EA5UFM6G9Ns0Mt5LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNY
                              Process:C:\Users\user\Desktop\XX(1).exe
                              File Type:data
                              Category:dropped
                              Size (bytes):9940
                              Entropy (8bit):7.596040375820741
                              Encrypted:false
                              SSDEEP:192:u5jwEiq/w5nw1R9G7k3mkX6xL2suKfvkQ5+If15RTPhikwekbwxsiREx:U6q/w5nwdG7wnCznk9If15RLh8BIsiRy
                              MD5:94CF1A211CC50D7AE7F5E7ED9095C7C8
                              SHA1:1A955286D1D122EAE43910CE297E1CFEF51C0ABD
                              SHA-256:027A34A56BD82FA347A68D8A5207E941093191CE98F22D58DD26F904D0652F31
                              SHA-512:B30ADDA6C73383731FD2C6CB3303F0A2B01F6D937F68846DB9EE4AE10608847E988E502BCA46CD0F44BC00E7D275EE59CC4044153316257CC0C3E33703888E9B
                              Malicious:false
                              Reputation:low
                              Preview:EA06..tT.Q&...8.M.z,.D.Lf....y9......o3.N&T...5...j..m1..f.Y..cD.L'.....3.N(s...m9...s.5..8.L/.Y...e..&6[...0.L..I..k7.N&. ..a0.M.....q4.Nf.P.....K..d.%...p.lY@.......c.Xf.0.o..b.L.`...,@. ...3+..d....s4.l&..........|....sa...`.........Y&.K0.....-vs5.M..2...N&.I...@.>..........$.0...fx. ..$l...I...#..$6...... ..... .Z...a.5..&.).....L.j.;$....M.j.;$....X@j.;%....Y@j.;,.....j.e.|f #^...j......l.....l.5....>0..Xf....M.^....$zn.....G..I....C...M.|........}S{....7...| l..P..........0...`>;..c7.6..{......=..7..............6,......b...,S ...i5.M.4.b..i|v)....b.h.,@..%........9....c...|3Y..h......._......@.>K...,v[..q5.M,.@..i7.X......9....2.......,.`....3.,.i8........}.k(.f..@..M&V....7.,.x....&.......0.......Fh...Fb.....3.."a9...`....,vb.....cd.X..P.Fl.Y.$..c. ....I...d..f.!...,vd......8..P.......0.....2...y...D.......c.0.......b.<NA...NM..;4.X.q1..&@Q..B.Y.ah......Yl.i..."..Bvj.........ic..'3Y..'f.....,j.1........C.`....7b.., .p..T.......Y,Vi......@
                              Process:C:\Users\user\Desktop\XX(1).exe
                              File Type:data
                              Category:dropped
                              Size (bytes):268288
                              Entropy (8bit):7.906714483935363
                              Encrypted:false
                              SSDEEP:6144:DR95YCHlkpYPvkUvBxZnICQxQ3ha7S/6yV9y:jH8VQnxQx6JV9y
                              MD5:0627D8EA9C9A86C685642A0CADA49435
                              SHA1:14B98255BFDB171DD4C4493DBF37A9599750AA06
                              SHA-256:E79B150EC9F056E0DEBFAA6377C5B496E17A2AFB00418BC417F9AD3706FF1787
                              SHA-512:26EF50CCFAAE562F0F0833BF06B5E2BE09082CE78E4900D47DC9552DE4F897FD02E4510550FEA1B8BAB819BDA15DEBC63619CA341D1F9CA7386E3C5D1640934C
                              Malicious:false
                              Reputation:low
                              Preview:.n.LQ2ABJYPQ..0P.2EA5UFMvG9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30.45L\-.LN.Y.e.1....)\&f=D(^<R]mWT"<]5b,<p#1Z.94...fu+"R".C>:i45LR2AB&I.|hE..vC.?.$.3.dF0.A.J>..Lj3.'| .Jl!.Lwb[+Z<.9.mZN.E.2`.:<c(./.]S8vC.?5UFM6G9N30M45LR2.:.?PQD4`.Z2.@1U2.6.9N30M45L.2bCEXYQD.1PZNGA5UFM..9N3 M45.S2AB.YPAD40RZ2@A5UFM6G<N30M45LRREBN]PQ..2PX2E.5UVM6W9N30]45\R2ABNY@QD40PZ2EA5U.X4GiN30MT7L^.@BNYPQD40PZ2EA5UFM6G9N30M4..S2]BNYPQD40PZ2EA5UFM6G9N30M45L.?CB.YPQD40PZ2EA5.GM.F9N30M45LR2ABNYPQD40PZ2EA5Uh9S?MN30U.4LR"ABN.QQD00PZ2EA5UFM6G9N.0MT.>6S5#NY.<D40.[2E/5UF.7G9N30M45LR2AB.YP.jPQ$;2EA.eFM6g;N3&M45FP2ABNYPQD40PZ2.A5.h?E5ZN30A.4LRRCBN.QQD.2PZ2EA5UFM6G9Ns0Mt5LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNYPQD40PZ2EA5UFM6G9N30M45LR2ABNY
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):7.121105411516716
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:XX(1).exe
                              File size:1'171'456 bytes
                              MD5:ceee05227b74e5a1e6d89f3b1cdfd24b
                              SHA1:7c7038b477f3d68226abf7eb1f8b4e9b9cfae331
                              SHA256:0f30bd5220de4c7fb2d426a392b5fcdbf1062b33a65761cb2af0d4732a2b2c2e
                              SHA512:931eed40bcb985de50c631f1b2565edf4bcdc78d56d9e2b31c608a634367c227325152dc4644d498924bcc09d5a11f3ace19193b9d1ea4aa897747f2b073a4c9
                              SSDEEP:24576:WAHnh+eWsN3skA4RV1Hom2KXMmHabDXVNuE25:xh+ZkldoPK8YabD3A
                              TLSH:E145BD0273D5C036FFAB92739B6AF24196BC79254133852F13981DB9BD701B2263E663
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                              Icon Hash:aaf3e3e3938382a0
                              Entrypoint:0x42800a
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                              Time Stamp:0x6685DB23 [Wed Jul 3 23:13:39 2024 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:5
                              OS Version Minor:1
                              File Version Major:5
                              File Version Minor:1
                              Subsystem Version Major:5
                              Subsystem Version Minor:1
                              Import Hash:afcdf79be1557326c854b6e20cb900a7
                              Instruction
                              call 00007FD4EC80C56Dh
                              jmp 00007FD4EC7FF324h
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              push edi
                              push esi
                              mov esi, dword ptr [esp+10h]
                              mov ecx, dword ptr [esp+14h]
                              mov edi, dword ptr [esp+0Ch]
                              mov eax, ecx
                              mov edx, ecx
                              add eax, esi
                              cmp edi, esi
                              jbe 00007FD4EC7FF4AAh
                              cmp edi, eax
                              jc 00007FD4EC7FF80Eh
                              bt dword ptr [004C41FCh], 01h
                              jnc 00007FD4EC7FF4A9h
                              rep movsb
                              jmp 00007FD4EC7FF7BCh
                              cmp ecx, 00000080h
                              jc 00007FD4EC7FF674h
                              mov eax, edi
                              xor eax, esi
                              test eax, 0000000Fh
                              jne 00007FD4EC7FF4B0h
                              bt dword ptr [004BF324h], 01h
                              jc 00007FD4EC7FF980h
                              bt dword ptr [004C41FCh], 00000000h
                              jnc 00007FD4EC7FF64Dh
                              test edi, 00000003h
                              jne 00007FD4EC7FF65Eh
                              test esi, 00000003h
                              jne 00007FD4EC7FF63Dh
                              bt edi, 02h
                              jnc 00007FD4EC7FF4AFh
                              mov eax, dword ptr [esi]
                              sub ecx, 04h
                              lea esi, dword ptr [esi+04h]
                              mov dword ptr [edi], eax
                              lea edi, dword ptr [edi+04h]
                              bt edi, 03h
                              jnc 00007FD4EC7FF4B3h
                              movq xmm1, qword ptr [esi]
                              sub ecx, 08h
                              lea esi, dword ptr [esi+08h]
                              movq qword ptr [edi], xmm1
                              lea edi, dword ptr [edi+08h]
                              test esi, 00000007h
                              je 00007FD4EC7FF505h
                              bt esi, 03h
                              Programming Language:
                              • [ASM] VS2013 build 21005
                              • [ C ] VS2013 build 21005
                              • [C++] VS2013 build 21005
                              • [ C ] VS2008 SP1 build 30729
                              • [IMP] VS2008 SP1 build 30729
                              • [ASM] VS2013 UPD5 build 40629
                              • [RES] VS2013 build 21005
                              • [LNK] VS2013 UPD5 build 40629
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x53868.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x11c0000x7134.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0xc80000x538680x53a0028ba6f6d00f5061ea0a9d96924e34585False0.9205232856875935data7.8798016417732315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x11c0000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                              RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                              RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                              RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                              RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                              RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                              RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                              RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                              RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                              RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                              RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                              RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
                              RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
                              RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
                              RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
                              RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
                              RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
                              RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
                              RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                              RT_RCDATA0xd07b80x4ab30data1.000330099879726
                              RT_GROUP_ICON0x11b2e80x76dataEnglishGreat Britain0.6610169491525424
                              RT_GROUP_ICON0x11b3600x14dataEnglishGreat Britain1.25
                              RT_GROUP_ICON0x11b3740x14dataEnglishGreat Britain1.15
                              RT_GROUP_ICON0x11b3880x14dataEnglishGreat Britain1.25
                              RT_VERSION0x11b39c0xdcdataEnglishGreat Britain0.6181818181818182
                              RT_MANIFEST0x11b4780x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                              DLLImport
                              WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                              VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                              COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                              MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                              WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                              PSAPI.DLLGetProcessMemoryInfo
                              IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                              USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                              UxTheme.dllIsThemeActive
                              KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                              USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                              GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                              COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                              ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                              SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                              OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                              Language of compilation systemCountry where language is spokenMap
                              EnglishGreat Britain
                              TimestampSource PortDest PortSource IPDest IP
                              Jul 5, 2024 03:38:30.828917027 CEST49730443192.168.2.4172.67.74.152
                              Jul 5, 2024 03:38:30.828968048 CEST44349730172.67.74.152192.168.2.4
                              Jul 5, 2024 03:38:30.829020023 CEST49730443192.168.2.4172.67.74.152
                              Jul 5, 2024 03:38:30.838798046 CEST49730443192.168.2.4172.67.74.152
                              Jul 5, 2024 03:38:30.838805914 CEST44349730172.67.74.152192.168.2.4
                              Jul 5, 2024 03:38:31.356930017 CEST44349730172.67.74.152192.168.2.4
                              Jul 5, 2024 03:38:31.356996059 CEST49730443192.168.2.4172.67.74.152
                              Jul 5, 2024 03:38:31.360694885 CEST49730443192.168.2.4172.67.74.152
                              Jul 5, 2024 03:38:31.360702038 CEST44349730172.67.74.152192.168.2.4
                              Jul 5, 2024 03:38:31.361121893 CEST44349730172.67.74.152192.168.2.4
                              Jul 5, 2024 03:38:31.411658049 CEST49730443192.168.2.4172.67.74.152
                              Jul 5, 2024 03:38:31.413618088 CEST49730443192.168.2.4172.67.74.152
                              Jul 5, 2024 03:38:31.456516027 CEST44349730172.67.74.152192.168.2.4
                              Jul 5, 2024 03:38:31.520653963 CEST44349730172.67.74.152192.168.2.4
                              Jul 5, 2024 03:38:31.520741940 CEST44349730172.67.74.152192.168.2.4
                              Jul 5, 2024 03:38:31.520790100 CEST49730443192.168.2.4172.67.74.152
                              Jul 5, 2024 03:38:31.527592897 CEST49730443192.168.2.4172.67.74.152
                              Jul 5, 2024 03:38:32.066219091 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:38:32.072803974 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:32.072879076 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:38:32.981127977 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:32.981314898 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:38:32.987627983 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:33.184051037 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:33.184236050 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:38:33.190459013 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:33.386641979 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:33.387202024 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:38:33.392168999 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:33.598413944 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:33.598433971 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:33.598445892 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:33.598453045 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:33.598524094 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:38:33.693921089 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:33.728215933 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:38:33.733094931 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:33.939450026 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:33.942773104 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:38:33.947587013 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:34.143902063 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:34.145231962 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:38:34.150065899 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:34.346570015 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:34.346963882 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:38:34.351820946 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:34.569233894 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:34.569524050 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:38:34.574423075 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:34.776788950 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:34.777061939 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:38:34.781868935 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:35.027184963 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:35.027388096 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:38:35.032247066 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:35.228354931 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:35.228934050 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:38:35.228974104 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:38:35.228995085 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:38:35.229013920 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:38:35.233859062 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:35.233870983 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:35.234103918 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:35.234114885 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:35.533879042 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:38:35.583571911 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:40:12.053180933 CEST49731587192.168.2.4164.68.127.9
                              Jul 5, 2024 03:40:12.058012009 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:40:12.255248070 CEST58749731164.68.127.9192.168.2.4
                              Jul 5, 2024 03:40:12.255935907 CEST49731587192.168.2.4164.68.127.9
                              TimestampSource PortDest PortSource IPDest IP
                              Jul 5, 2024 03:38:30.778460026 CEST5068553192.168.2.41.1.1.1
                              Jul 5, 2024 03:38:30.785177946 CEST53506851.1.1.1192.168.2.4
                              Jul 5, 2024 03:38:32.037345886 CEST5027953192.168.2.41.1.1.1
                              Jul 5, 2024 03:38:32.065198898 CEST53502791.1.1.1192.168.2.4
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jul 5, 2024 03:38:30.778460026 CEST192.168.2.41.1.1.10x7e82Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                              Jul 5, 2024 03:38:32.037345886 CEST192.168.2.41.1.1.10xa351Standard query (0)mail.magnatextile.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jul 5, 2024 03:38:30.785177946 CEST1.1.1.1192.168.2.40x7e82No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                              Jul 5, 2024 03:38:30.785177946 CEST1.1.1.1192.168.2.40x7e82No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                              Jul 5, 2024 03:38:30.785177946 CEST1.1.1.1192.168.2.40x7e82No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                              Jul 5, 2024 03:38:32.065198898 CEST1.1.1.1192.168.2.40xa351No error (0)mail.magnatextile.commagnatextile.comCNAME (Canonical name)IN (0x0001)false
                              Jul 5, 2024 03:38:32.065198898 CEST1.1.1.1192.168.2.40xa351No error (0)magnatextile.com164.68.127.9A (IP address)IN (0x0001)false
                              • api.ipify.org
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.449730172.67.74.1524437448C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                              TimestampBytes transferredDirectionData
                              2024-07-05 01:38:31 UTC155OUTGET / HTTP/1.1
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                              Host: api.ipify.org
                              Connection: Keep-Alive
                              2024-07-05 01:38:31 UTC211INHTTP/1.1 200 OK
                              Date: Fri, 05 Jul 2024 01:38:31 GMT
                              Content-Type: text/plain
                              Content-Length: 11
                              Connection: close
                              Vary: Origin
                              CF-Cache-Status: DYNAMIC
                              Server: cloudflare
                              CF-RAY: 89e3a2d2ad0a41c3-EWR
                              2024-07-05 01:38:31 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                              Data Ascii: 8.46.123.33


                              TimestampSource PortDest PortSource IPDest IPCommands
                              Jul 5, 2024 03:38:32.981127977 CEST58749731164.68.127.9192.168.2.4220-hosting.magna-group.com ESMTP Exim 4.96.2 #2 Fri, 05 Jul 2024 06:38:32 +0500
                              220-We do not authorize the use of this system to transport unsolicited,
                              220 and/or bulk e-mail.
                              Jul 5, 2024 03:38:32.981314898 CEST49731587192.168.2.4164.68.127.9EHLO 138727
                              Jul 5, 2024 03:38:33.184051037 CEST58749731164.68.127.9192.168.2.4250-hosting.magna-group.com Hello 138727 [8.46.123.33]
                              250-SIZE 52428800
                              250-8BITMIME
                              250-PIPELINING
                              250-PIPECONNECT
                              250-STARTTLS
                              250 HELP
                              Jul 5, 2024 03:38:33.184236050 CEST49731587192.168.2.4164.68.127.9STARTTLS
                              Jul 5, 2024 03:38:33.386641979 CEST58749731164.68.127.9192.168.2.4220 TLS go ahead

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:21:38:28
                              Start date:04/07/2024
                              Path:C:\Users\user\Desktop\XX(1).exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\XX(1).exe"
                              Imagebase:0x9f0000
                              File size:1'171'456 bytes
                              MD5 hash:CEEE05227B74E5A1E6D89F3B1CDFD24B
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.1643879662.0000000003760000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                              Reputation:low
                              Has exited:true

                              Target ID:1
                              Start time:21:38:29
                              Start date:04/07/2024
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\XX(1).exe"
                              Imagebase:0xfb0000
                              File size:45'984 bytes
                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000001.00000002.2885945519.0000000005A90000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000001.00000002.2885254830.00000000059D0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2883398358.000000000348F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2883166588.000000000312F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2883166588.000000000312F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.2883166588.000000000312F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2884800788.0000000004411000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2884800788.0000000004411000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000001.00000002.2884800788.0000000004411000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2883398358.0000000003464000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2883398358.0000000003464000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2883398358.0000000003497000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000001.00000002.2882112766.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2883398358.00000000034A3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:high
                              Has exited:false

                              No disassembly