Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
231210-01-AgentTesla-2eba02.exe

Overview

General Information

Sample name:231210-01-AgentTesla-2eba02.exe
Analysis ID:1480036
MD5:7911215edc491695bf598dbff6f1d0c1
SHA1:2eba02407a65333a3675b0bafda8ddd3f2f7fc99
SHA256:bc419893a2948f85aa53af290eca67dc626ab1467b72a45419385d0fe709fd58
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.elec-qatar.com", "Username": "mohammed.abrar@elec-qatar.com", "Password": "MHabrar2019@#"}
SourceRuleDescriptionAuthorStrings
231210-01-AgentTesla-2eba02.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    231210-01-AgentTesla-2eba02.exeJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      231210-01-AgentTesla-2eba02.exeINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
      • 0x335cd:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
      • 0x3363f:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
      • 0x336c9:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
      • 0x3375b:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
      • 0x337c5:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
      • 0x33837:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
      • 0x338cd:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
      • 0x3395d:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
      SourceRuleDescriptionAuthorStrings
      00000001.00000002.2494896359.0000000002CBE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000000.1238101496.00000000009B2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000001.00000000.1238101496.00000000009B2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000001.00000002.2494896359.0000000002C71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              00000001.00000002.2494896359.0000000002C71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 2 entries
                SourceRuleDescriptionAuthorStrings
                1.0.231210-01-AgentTesla-2eba02.exe.9b0000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  1.0.231210-01-AgentTesla-2eba02.exe.9b0000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    1.0.231210-01-AgentTesla-2eba02.exe.9b0000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                    • 0x335cd:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                    • 0x3363f:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                    • 0x336c9:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                    • 0x3375b:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                    • 0x337c5:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                    • 0x33837:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                    • 0x338cd:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                    • 0x3395d:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 50.87.139.143, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe, Initiated: true, ProcessId: 2692, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49699
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 231210-01-AgentTesla-2eba02.exeAvira: detected
                    Source: 231210-01-AgentTesla-2eba02.exeMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.elec-qatar.com", "Username": "mohammed.abrar@elec-qatar.com", "Password": "MHabrar2019@#"}
                    Source: 231210-01-AgentTesla-2eba02.exeReversingLabs: Detection: 73%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: 231210-01-AgentTesla-2eba02.exeJoe Sandbox ML: detected
                    Source: 231210-01-AgentTesla-2eba02.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 231210-01-AgentTesla-2eba02.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: global trafficTCP traffic: 192.168.2.7:49699 -> 50.87.139.143:587
                    Source: Joe Sandbox ViewIP Address: 50.87.139.143 50.87.139.143
                    Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                    Source: global trafficTCP traffic: 192.168.2.7:49699 -> 50.87.139.143:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: mail.elec-qatar.com
                    Source: 231210-01-AgentTesla-2eba02.exe, 00000001.00000002.2494896359.0000000002CC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.elec-qatar.com
                    Source: 231210-01-AgentTesla-2eba02.exeString found in binary or memory: https://account.dyn.com/

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 231210-01-AgentTesla-2eba02.exe, TOgp3h.cs.Net Code: qmjRo

                    System Summary

                    barindex
                    Source: 231210-01-AgentTesla-2eba02.exe, type: SAMPLEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 1.0.231210-01-AgentTesla-2eba02.exe.9b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeCode function: 1_2_02C493781_2_02C49378
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeCode function: 1_2_02C44A981_2_02C44A98
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeCode function: 1_2_02C43E801_2_02C43E80
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeCode function: 1_2_02C4CFC81_2_02C4CFC8
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeCode function: 1_2_02C49C001_2_02C49C00
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeCode function: 1_2_02C441C81_2_02C441C8
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeCode function: 1_2_05FBDD581_2_05FBDD58
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeCode function: 1_2_05FBBD401_2_05FBBD40
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeCode function: 1_2_05FB3F801_2_05FB3F80
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeCode function: 1_2_05FB57201_2_05FB5720
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeCode function: 1_2_05FB00401_2_05FB0040
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeCode function: 1_2_05FB8BE01_2_05FB8BE0
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeCode function: 1_2_05FB9B281_2_05FB9B28
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeCode function: 1_2_05FB2B101_2_05FB2B10
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeCode function: 1_2_05FB50281_2_05FB5028
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeCode function: 1_2_05FB32781_2_05FB3278
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeCode function: 1_2_02C49BF81_2_02C49BF8
                    Source: 231210-01-AgentTesla-2eba02.exe, 00000001.00000000.1238173889.00000000009EE000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename068524b8-d918-4107-9401-212dd26aaaa3.exe4 vs 231210-01-AgentTesla-2eba02.exe
                    Source: 231210-01-AgentTesla-2eba02.exe, 00000001.00000002.2490949004.0000000000D89000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs 231210-01-AgentTesla-2eba02.exe
                    Source: 231210-01-AgentTesla-2eba02.exe, 00000001.00000002.2491592427.0000000000E6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 231210-01-AgentTesla-2eba02.exe
                    Source: 231210-01-AgentTesla-2eba02.exeBinary or memory string: OriginalFilename068524b8-d918-4107-9401-212dd26aaaa3.exe4 vs 231210-01-AgentTesla-2eba02.exe
                    Source: 231210-01-AgentTesla-2eba02.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 231210-01-AgentTesla-2eba02.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 1.0.231210-01-AgentTesla-2eba02.exe.9b0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 231210-01-AgentTesla-2eba02.exe, jCzkkFGbiW.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 231210-01-AgentTesla-2eba02.exe, ZFYrnBYEI.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                    Source: 231210-01-AgentTesla-2eba02.exe, TAIf.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 231210-01-AgentTesla-2eba02.exe, fMld7.csCryptographic APIs: 'CreateDecryptor'
                    Source: 231210-01-AgentTesla-2eba02.exe, jT3EMCHnL02.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 231210-01-AgentTesla-2eba02.exe, LyqEkh9QZ.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 231210-01-AgentTesla-2eba02.exe, tF0n0U.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 231210-01-AgentTesla-2eba02.exe, tF0n0U.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 231210-01-AgentTesla-2eba02.exeBinary string: ID: 0x{0:X}qSize of the SerializedPropertyStore is less than 8 ({0})/StoreSize: {0} (0x{0X})3\Device\LanmanRedirector\[Failed to retrieve system handle information.
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@1/1
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeMutant created: NULL
                    Source: 231210-01-AgentTesla-2eba02.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 231210-01-AgentTesla-2eba02.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: 231210-01-AgentTesla-2eba02.exeReversingLabs: Detection: 73%
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: 231210-01-AgentTesla-2eba02.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: 231210-01-AgentTesla-2eba02.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeMemory allocated: 1320000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeMemory allocated: 2C70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeMemory allocated: 4C70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeWindow / User API: threadDelayed 1560Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeWindow / User API: threadDelayed 4111Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -19369081277395017s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -100000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2232Thread sleep count: 1560 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -99875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2232Thread sleep count: 4111 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -99766s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -99653s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -99532s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -99407s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -99282s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -99157s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -99046s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -98922s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -98813s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -98703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -98593s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -98482s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -98360s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -98247s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -98103s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -97641s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -97516s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -97407s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -97282s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -97157s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -97047s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -96922s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -96813s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -96703s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -96594s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -96469s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe TID: 2940Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeLast function: Thread delayed
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 99875Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 99766Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 99653Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 99532Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 99407Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 99282Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 99157Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 99046Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 98922Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 98813Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 98703Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 98593Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 98482Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 98360Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 98247Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 98103Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 97641Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 97516Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 97407Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 97282Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 97157Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 97047Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 96922Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 96813Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 96703Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 96594Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 96469Jump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: 231210-01-AgentTesla-2eba02.exe, 00000001.00000002.2491592427.0000000000F0D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll\Q6
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeQueries volume information: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 231210-01-AgentTesla-2eba02.exe, type: SAMPLE
                    Source: Yara matchFile source: 1.0.231210-01-AgentTesla-2eba02.exe.9b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2494896359.0000000002CBE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.1238101496.00000000009B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2494896359.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 231210-01-AgentTesla-2eba02.exe PID: 2692, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 231210-01-AgentTesla-2eba02.exe, type: SAMPLE
                    Source: Yara matchFile source: 1.0.231210-01-AgentTesla-2eba02.exe.9b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000000.1238101496.00000000009B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2494896359.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 231210-01-AgentTesla-2eba02.exe PID: 2692, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 231210-01-AgentTesla-2eba02.exe, type: SAMPLE
                    Source: Yara matchFile source: 1.0.231210-01-AgentTesla-2eba02.exe.9b0000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2494896359.0000000002CBE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000000.1238101496.00000000009B2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2494896359.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 231210-01-AgentTesla-2eba02.exe PID: 2692, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    111
                    Security Software Discovery
                    Remote Services1
                    Email Collection
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts141
                    Virtualization/Sandbox Evasion
                    1
                    Input Capture
                    1
                    Process Discovery
                    Remote Desktop Protocol1
                    Input Capture
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                    Deobfuscate/Decode Files or Information
                    1
                    Credentials in Registry
                    141
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin Shares11
                    Archive Collected Data
                    1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    DLL Side-Loading
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object Model2
                    Data from Local System
                    11
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
                    File and Directory Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials24
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    231210-01-AgentTesla-2eba02.exe74%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    231210-01-AgentTesla-2eba02.exe100%AviraTR/Spy.Gen8
                    231210-01-AgentTesla-2eba02.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://account.dyn.com/0%URL Reputationsafe
                    http://mail.elec-qatar.com0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    mail.elec-qatar.com
                    50.87.139.143
                    truetrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://mail.elec-qatar.com231210-01-AgentTesla-2eba02.exe, 00000001.00000002.2494896359.0000000002CC6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://account.dyn.com/231210-01-AgentTesla-2eba02.exefalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      50.87.139.143
                      mail.elec-qatar.comUnited States
                      46606UNIFIEDLAYER-AS-1UStrue
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1480036
                      Start date and time:2024-07-24 14:23:53 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 4m 23s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:16
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:231210-01-AgentTesla-2eba02.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@1/0@1/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 60
                      • Number of non-executed functions: 3
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: 231210-01-AgentTesla-2eba02.exe
                      TimeTypeDescription
                      08:24:47API Interceptor28x Sleep call for process: 231210-01-AgentTesla-2eba02.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      50.87.139.143SecuriteInfo.com.Heur.18737.25106.exeGet hashmaliciousAgentTeslaBrowse
                        SecuriteInfo.com.Win32.PWSX-gen.23449.29887.exeGet hashmaliciousAgentTeslaBrowse
                          NEW ORDER 98540-0.exeGet hashmaliciousAgentTeslaBrowse
                            Documents of shipment 3-2024.exeGet hashmaliciousAgentTeslaBrowse
                              SHIPPING DOC.exeGet hashmaliciousAgentTeslaBrowse
                                Order 19A20060.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                  Proforma Invoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                    SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                      SHIPPING DOC.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                        New order.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          mail.elec-qatar.comSecuriteInfo.com.Heur.18737.25106.exeGet hashmaliciousAgentTeslaBrowse
                                          • 50.87.139.143
                                          SecuriteInfo.com.Win32.PWSX-gen.23449.29887.exeGet hashmaliciousAgentTeslaBrowse
                                          • 50.87.139.143
                                          NEW ORDER 98540-0.exeGet hashmaliciousAgentTeslaBrowse
                                          • 50.87.139.143
                                          Documents of shipment 3-2024.exeGet hashmaliciousAgentTeslaBrowse
                                          • 50.87.139.143
                                          SHIPPING DOC.exeGet hashmaliciousAgentTeslaBrowse
                                          • 50.87.139.143
                                          Order 19A20060.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 50.87.139.143
                                          Proforma Invoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 50.87.139.143
                                          SecuriteInfo.com.Variant.Lazy.463632.16595.14067.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 50.87.139.143
                                          SHIPPING DOC.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 50.87.139.143
                                          New order.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 50.87.139.143
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          UNIFIEDLAYER-AS-1UShttp://www.agrimarkeurope.com/feed-commodities.Get hashmaliciousUnknownBrowse
                                          • 173.254.30.100
                                          https://lailaf50897.clickfunnels.com/auto-webinar-registration1721805327948Get hashmaliciousHTMLPhisherBrowse
                                          • 192.185.165.78
                                          Order Requirement FOB Middle East.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 192.185.113.233
                                          95cc26903867ce68cb392ca3fe5ad21e371b8b6b2f1540137d0c6d26e9ca69c7_dump.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 108.179.234.136
                                          List & Sample_Doc3.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                          • 108.167.181.251
                                          Shipping Documents_pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                          • 108.179.234.136
                                          Apixaban - August 2024.XLS.exeGet hashmaliciousSnake KeyloggerBrowse
                                          • 108.167.181.251
                                          Collexus Knowledge Base Access.docxGet hashmaliciousUnknownBrowse
                                          • 192.254.232.202
                                          https://www.turkiyecumhuriyetiziraatbankasi.com/en/product-and-service-fees.htmlGet hashmaliciousUnknownBrowse
                                          • 162.240.37.219
                                          http://nia.sga.mybluehost.me/Get hashmaliciousUnknownBrowse
                                          • 162.241.226.133
                                          No context
                                          No context
                                          No created / dropped files found
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):4.999622243728955
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                          • Win32 Executable (generic) a (10002005/4) 49.75%
                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                          • Windows Screen Saver (13104/52) 0.07%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          File name:231210-01-AgentTesla-2eba02.exe
                                          File size:240'640 bytes
                                          MD5:7911215edc491695bf598dbff6f1d0c1
                                          SHA1:2eba02407a65333a3675b0bafda8ddd3f2f7fc99
                                          SHA256:bc419893a2948f85aa53af290eca67dc626ab1467b72a45419385d0fe709fd58
                                          SHA512:e0c8c566925d0fd15b105270ca2c6599597502df6876378e6f676cc4e0ee2d05c36ba73210412c7eaf7bb051051087867e7c6921ff88533b0e2a9a8a263426c6
                                          SSDEEP:6144:UR1ZlxGUdnFTKh6BbiYHXvf4Ax+C0c+g:UR1ZlxGUdnFKobf/jMX
                                          TLSH:03340E037E48EB15E5A83E3782EF6C2413B2B0C71633C60B6F49AFA518516925D7E72D
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...9.re................................. ........@.. ....................... ............@................................
                                          Icon Hash:00928e8e8686b000
                                          Entrypoint:0x43c02e
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x6572F139 [Fri Dec 8 10:34:33 2023 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x3bfdc0x4f.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3e0000x546.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x400000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000x3a0340x3a200ba208a6c8a5cdda35434135b7f470a84False0.35699344758064516data5.0110603590563825IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0x3e0000x5460x6007d4472e9b45d3736c5771007112b4bb2False0.4010416666666667data4.004180396667646IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x400000xc0x200a515ae9255f4d4a0501cea1d147738dbFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_VERSION0x3e0a00x2bcdata0.44
                                          RT_MANIFEST0x3e35c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jul 24, 2024 14:24:48.100517035 CEST49699587192.168.2.750.87.139.143
                                          Jul 24, 2024 14:24:48.105468035 CEST5874969950.87.139.143192.168.2.7
                                          Jul 24, 2024 14:24:48.105545044 CEST49699587192.168.2.750.87.139.143
                                          Jul 24, 2024 14:24:48.783190012 CEST5874969950.87.139.143192.168.2.7
                                          Jul 24, 2024 14:24:48.783513069 CEST49699587192.168.2.750.87.139.143
                                          Jul 24, 2024 14:24:48.788532019 CEST5874969950.87.139.143192.168.2.7
                                          Jul 24, 2024 14:24:49.376509905 CEST5874969950.87.139.143192.168.2.7
                                          Jul 24, 2024 14:24:49.377480030 CEST49699587192.168.2.750.87.139.143
                                          Jul 24, 2024 14:24:49.377626896 CEST5874969950.87.139.143192.168.2.7
                                          Jul 24, 2024 14:24:49.377785921 CEST49699587192.168.2.750.87.139.143
                                          Jul 24, 2024 14:24:49.378107071 CEST5874969950.87.139.143192.168.2.7
                                          Jul 24, 2024 14:24:49.378156900 CEST49699587192.168.2.750.87.139.143
                                          Jul 24, 2024 14:24:49.384408951 CEST5874969950.87.139.143192.168.2.7
                                          Jul 24, 2024 14:24:49.543003082 CEST5874969950.87.139.143192.168.2.7
                                          Jul 24, 2024 14:24:49.544053078 CEST49699587192.168.2.750.87.139.143
                                          Jul 24, 2024 14:24:49.549535036 CEST5874969950.87.139.143192.168.2.7
                                          Jul 24, 2024 14:24:51.377089977 CEST5874969950.87.139.143192.168.2.7
                                          Jul 24, 2024 14:24:51.377768993 CEST49699587192.168.2.750.87.139.143
                                          Jul 24, 2024 14:24:51.382622004 CEST5874969950.87.139.143192.168.2.7
                                          Jul 24, 2024 14:24:51.536485910 CEST5874969950.87.139.143192.168.2.7
                                          Jul 24, 2024 14:24:51.537803888 CEST5874969950.87.139.143192.168.2.7
                                          Jul 24, 2024 14:24:51.537874937 CEST49699587192.168.2.750.87.139.143
                                          Jul 24, 2024 14:24:51.545109034 CEST49699587192.168.2.750.87.139.143
                                          Jul 24, 2024 14:24:51.550004005 CEST5874969950.87.139.143192.168.2.7
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jul 24, 2024 14:24:48.042783976 CEST6189753192.168.2.71.1.1.1
                                          Jul 24, 2024 14:24:48.089612961 CEST53618971.1.1.1192.168.2.7
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Jul 24, 2024 14:24:48.042783976 CEST192.168.2.71.1.1.10x24d2Standard query (0)mail.elec-qatar.comA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Jul 24, 2024 14:24:48.089612961 CEST1.1.1.1192.168.2.70x24d2No error (0)mail.elec-qatar.com50.87.139.143A (IP address)IN (0x0001)false
                                          TimestampSource PortDest PortSource IPDest IPCommands
                                          Jul 24, 2024 14:24:48.783190012 CEST5874969950.87.139.143192.168.2.7220-box2248.bluehost.com ESMTP Exim 4.96.2 #2 Wed, 24 Jul 2024 06:24:48 -0600
                                          220-We do not authorize the use of this system to transport unsolicited,
                                          220 and/or bulk e-mail.
                                          Jul 24, 2024 14:24:48.783513069 CEST49699587192.168.2.750.87.139.143EHLO 849224
                                          Jul 24, 2024 14:24:49.376509905 CEST5874969950.87.139.143192.168.2.7250-box2248.bluehost.com Hello 849224 [8.46.123.33]
                                          250-SIZE 52428800
                                          250-8BITMIME
                                          250-PIPELINING
                                          250-PIPECONNECT
                                          250-AUTH PLAIN LOGIN
                                          250-STARTTLS
                                          250 HELP
                                          Jul 24, 2024 14:24:49.377480030 CEST49699587192.168.2.750.87.139.143AUTH login bW9oYW1tZWQuYWJyYXJAZWxlYy1xYXRhci5jb20=
                                          Jul 24, 2024 14:24:49.377626896 CEST5874969950.87.139.143192.168.2.7250-box2248.bluehost.com Hello 849224 [8.46.123.33]
                                          250-SIZE 52428800
                                          250-8BITMIME
                                          250-PIPELINING
                                          250-PIPECONNECT
                                          250-AUTH PLAIN LOGIN
                                          250-STARTTLS
                                          250 HELP
                                          Jul 24, 2024 14:24:49.378107071 CEST5874969950.87.139.143192.168.2.7250-box2248.bluehost.com Hello 849224 [8.46.123.33]
                                          250-SIZE 52428800
                                          250-8BITMIME
                                          250-PIPELINING
                                          250-PIPECONNECT
                                          250-AUTH PLAIN LOGIN
                                          250-STARTTLS
                                          250 HELP
                                          Jul 24, 2024 14:24:49.543003082 CEST5874969950.87.139.143192.168.2.7334 UGFzc3dvcmQ6
                                          Jul 24, 2024 14:24:51.377089977 CEST5874969950.87.139.143192.168.2.7535 Incorrect authentication data
                                          Jul 24, 2024 14:24:51.377768993 CEST49699587192.168.2.750.87.139.143MAIL FROM:<mohammed.abrar@elec-qatar.com>
                                          Jul 24, 2024 14:24:51.536485910 CEST5874969950.87.139.143192.168.2.7550 Access denied - Invalid HELO name (See RFC2821 4.1.1.1)

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Target ID:1
                                          Start time:08:24:45
                                          Start date:24/07/2024
                                          Path:C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\231210-01-AgentTesla-2eba02.exe"
                                          Imagebase:0x9b0000
                                          File size:240'640 bytes
                                          MD5 hash:7911215EDC491695BF598DBFF6F1D0C1
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2494896359.0000000002CBE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.1238101496.00000000009B2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.1238101496.00000000009B2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2494896359.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2494896359.0000000002C71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:12.3%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:19
                                            Total number of Limit Nodes:4
                                            execution_graph 29348 2c40848 29350 2c4084e 29348->29350 29349 2c4091b 29350->29349 29352 2c41380 29350->29352 29353 2c41396 29352->29353 29354 2c41480 29353->29354 29356 2c47090 29353->29356 29354->29350 29357 2c4709a 29356->29357 29358 2c470b4 29357->29358 29361 5fbcfd8 29357->29361 29366 5fbcfc9 29357->29366 29358->29353 29363 5fbcfed 29361->29363 29362 5fbd202 29362->29358 29363->29362 29364 5fbd5f8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 29363->29364 29365 5fbd630 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 29363->29365 29364->29363 29365->29363 29368 5fbcfd8 29366->29368 29367 5fbd202 29367->29358 29368->29367 29369 5fbd5f8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 29368->29369 29370 5fbd630 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 29368->29370 29369->29368 29370->29368
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2497380955.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5fb0000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $q$$q$$q$$q$$q$$q
                                            • API String ID: 0-2069967915
                                            • Opcode ID: 368155356a58fee4b63b12b30e81a912fd3d7141ebeffb78c5cd23ac1eb2a8a8
                                            • Instruction ID: 14ebc2fe40f074b07fc9e24b896615411c44322b5cc90f708e240206096dbe7c
                                            • Opcode Fuzzy Hash: 368155356a58fee4b63b12b30e81a912fd3d7141ebeffb78c5cd23ac1eb2a8a8
                                            • Instruction Fuzzy Hash: 4E825C34E00715CFDB14EB65C854AAEB7B6FF89300F5486A9E409AB254EF74ED85CB80
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2497380955.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5fb0000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $q$$q$$q$$q$$q$$q
                                            • API String ID: 0-2069967915
                                            • Opcode ID: 02e349a685494f0d5d3b48d4fba77ade4c6f5a5f320f83abcca39c04eea8044b
                                            • Instruction ID: ffd88de8df628e1a4c62fcb69b86fda5fa3717f3a49391e69ec94b6f7cd4c049
                                            • Opcode Fuzzy Hash: 02e349a685494f0d5d3b48d4fba77ade4c6f5a5f320f83abcca39c04eea8044b
                                            • Instruction Fuzzy Hash: 1C527070E00209CFEF24DB6AD590BEDB7B6FB89310F248526E505DB385DAB9DC418B91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1182 5fb5720-5fb573e 1183 5fb5740-5fb5743 1182->1183 1184 5fb5766-5fb5769 1183->1184 1185 5fb5745-5fb5761 1183->1185 1186 5fb576b-5fb5779 1184->1186 1187 5fb5780-5fb5783 1184->1187 1185->1184 1194 5fb577b 1186->1194 1195 5fb57c6-5fb57dc 1186->1195 1188 5fb5785-5fb579f 1187->1188 1189 5fb57a4-5fb57a7 1187->1189 1188->1189 1192 5fb57a9-5fb57b3 1189->1192 1193 5fb57b4-5fb57b6 1189->1193 1197 5fb57b8 1193->1197 1198 5fb57bd-5fb57c0 1193->1198 1194->1187 1202 5fb57e2-5fb57eb 1195->1202 1203 5fb59f7-5fb5a01 1195->1203 1197->1198 1198->1183 1198->1195 1204 5fb5a02-5fb5a37 1202->1204 1205 5fb57f1-5fb580e 1202->1205 1208 5fb5a39-5fb5a3c 1204->1208 1214 5fb59e4-5fb59f1 1205->1214 1215 5fb5814-5fb583c 1205->1215 1210 5fb5ae9-5fb5aec 1208->1210 1211 5fb5a42-5fb5a4e 1208->1211 1212 5fb5b0f-5fb5b12 1210->1212 1213 5fb5aee-5fb5b0a 1210->1213 1218 5fb5a59-5fb5a5b 1211->1218 1216 5fb5b18-5fb5b27 1212->1216 1217 5fb5d47-5fb5d49 1212->1217 1213->1212 1214->1202 1214->1203 1215->1214 1238 5fb5842-5fb584b 1215->1238 1233 5fb5b29-5fb5b44 1216->1233 1234 5fb5b46-5fb5b8a 1216->1234 1220 5fb5d4b 1217->1220 1221 5fb5d50-5fb5d53 1217->1221 1223 5fb5a5d-5fb5a63 1218->1223 1224 5fb5a73-5fb5a77 1218->1224 1220->1221 1221->1208 1228 5fb5d59-5fb5d62 1221->1228 1229 5fb5a67-5fb5a69 1223->1229 1230 5fb5a65 1223->1230 1225 5fb5a79-5fb5a83 1224->1225 1226 5fb5a85 1224->1226 1231 5fb5a8a-5fb5a8c 1225->1231 1226->1231 1229->1224 1230->1224 1236 5fb5a8e-5fb5a91 1231->1236 1237 5fb5aa3-5fb5adc 1231->1237 1233->1234 1242 5fb5d1b-5fb5d30 1234->1242 1243 5fb5b90-5fb5ba1 1234->1243 1236->1228 1237->1216 1261 5fb5ade-5fb5ae8 1237->1261 1238->1204 1241 5fb5851-5fb586d 1238->1241 1248 5fb5873-5fb589d call 5fb1af0 1241->1248 1249 5fb59d2-5fb59de 1241->1249 1242->1217 1252 5fb5ba7-5fb5bc4 1243->1252 1253 5fb5d06-5fb5d15 1243->1253 1265 5fb59c8-5fb59cd 1248->1265 1266 5fb58a3-5fb58cb 1248->1266 1249->1214 1249->1238 1252->1253 1264 5fb5bca-5fb5cc0 call 5fb3f30 1252->1264 1253->1242 1253->1243 1315 5fb5cce 1264->1315 1316 5fb5cc2-5fb5ccc 1264->1316 1265->1249 1266->1265 1273 5fb58d1-5fb58ff 1266->1273 1273->1265 1278 5fb5905-5fb590e 1273->1278 1278->1265 1279 5fb5914-5fb5946 1278->1279 1287 5fb5948-5fb594c 1279->1287 1288 5fb5951-5fb596d 1279->1288 1287->1265 1289 5fb594e 1287->1289 1288->1249 1290 5fb596f-5fb59c6 call 5fb3f30 1288->1290 1289->1288 1290->1249 1317 5fb5cd3-5fb5cd5 1315->1317 1316->1317 1317->1253 1318 5fb5cd7-5fb5cdc 1317->1318 1319 5fb5cea 1318->1319 1320 5fb5cde-5fb5ce8 1318->1320 1321 5fb5cef-5fb5cf1 1319->1321 1320->1321 1321->1253 1322 5fb5cf3-5fb5cff 1321->1322 1322->1253
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2497380955.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5fb0000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $q$$q
                                            • API String ID: 0-3126353813
                                            • Opcode ID: 8715a52c748ac1348728f7c8f79b409247a61076d48b70eebcbe6f39b3316111
                                            • Instruction ID: 58f95dbc21e6450c22ca6fc41befcfa0c7bd6b9b2eab3240be99e1bd052d5a33
                                            • Opcode Fuzzy Hash: 8715a52c748ac1348728f7c8f79b409247a61076d48b70eebcbe6f39b3316111
                                            • Instruction Fuzzy Hash: 3F024D34B00215DFEB14DB69D494BAEBBE2FB84310F248529D815DB394EA79EC46CB80

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1324 5fbdd58-5fbdd6a 1325 5fbddce-5fbddd5 1324->1325 1326 5fbdd6c-5fbdd99 call 5fbd5d0 call 5fbd3f4 1324->1326 1333 5fbdd9e-5fbddab 1326->1333 1335 5fbddad-5fbddc6 1333->1335 1336 5fbddd6-5fbde3d 1333->1336 1335->1325 1346 5fbde3f-5fbde41 1336->1346 1347 5fbde46-5fbde56 1336->1347 1348 5fbe0e5-5fbe0ec 1346->1348 1349 5fbde58 1347->1349 1350 5fbde5d-5fbde6d 1347->1350 1349->1348 1352 5fbe0cc-5fbe0da 1350->1352 1353 5fbde73-5fbde81 1350->1353 1356 5fbe0ed-5fbe166 1352->1356 1357 5fbe0dc-5fbe0e0 call 5fb1af0 1352->1357 1353->1356 1358 5fbde87 1353->1358 1357->1348 1358->1356 1360 5fbdf18-5fbdf39 1358->1360 1361 5fbe07f-5fbe09a 1358->1361 1362 5fbdf3e-5fbdf5f 1358->1362 1363 5fbe09c-5fbe0be 1358->1363 1364 5fbdef2-5fbdf13 1358->1364 1365 5fbe051-5fbe07d 1358->1365 1366 5fbdfb7-5fbdfdf 1358->1366 1367 5fbdecb-5fbdeed 1358->1367 1368 5fbdf8a-5fbdfb2 1358->1368 1369 5fbde8e-5fbdea0 1358->1369 1370 5fbe0c0-5fbe0ca 1358->1370 1371 5fbe026-5fbe04c 1358->1371 1372 5fbdea5-5fbdec6 1358->1372 1373 5fbdf64-5fbdf85 1358->1373 1374 5fbdfe4-5fbe021 1358->1374 1360->1348 1361->1348 1362->1348 1363->1348 1364->1348 1365->1348 1366->1348 1367->1348 1368->1348 1369->1348 1370->1348 1371->1348 1372->1348 1373->1348 1374->1348
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2497380955.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5fb0000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Xq$$q
                                            • API String ID: 0-855381642
                                            • Opcode ID: e25d0bdc04c30b7e01166a5aab3a0b4a2477886d127646152053ea3963000bf6
                                            • Instruction ID: 5ea77b3856a1c3c5a81694cd2784ec495aa7c32ca37bb863b76c2111095188b4
                                            • Opcode Fuzzy Hash: e25d0bdc04c30b7e01166a5aab3a0b4a2477886d127646152053ea3963000bf6
                                            • Instruction Fuzzy Hash: 8CB17135F042189BEB18EB7998546BE7BA7BFC8300B15892DE547D7388DE399C028791
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a3c38a27ae4b872bbc0a302c40dcd0650030e42f45ddd105cf5891e184c0b923
                                            • Instruction ID: 494087533d3fd3b0b110421a54c0e0843312cddd6202b0f72b04c87d0ce69078
                                            • Opcode Fuzzy Hash: a3c38a27ae4b872bbc0a302c40dcd0650030e42f45ddd105cf5891e184c0b923
                                            • Instruction Fuzzy Hash: CC63D831C10B1A8ADB11EF68C990699F7B1FF99300F15D79AE45877221EB70AAD4CF81
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0a3a3a7b0a46d2a58d8a77e11cfbb28c5ce785f7e542c4a8cb9ce3c5b6bce6c2
                                            • Instruction ID: 0c44fdd8df6daa5eedfbce719560af93fef34e03e0894663e58f037374c1ef58
                                            • Opcode Fuzzy Hash: 0a3a3a7b0a46d2a58d8a77e11cfbb28c5ce785f7e542c4a8cb9ce3c5b6bce6c2
                                            • Instruction Fuzzy Hash: F053E831C10B1A8ADB11EF68C990699F7B1FF99300F15D79AE45877221EB70AAD4CF81
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fa0caefbeaaf93105c9bb87969c6c0f3ae4e21aeebdf57d47ed4ec090a8a035e
                                            • Instruction ID: 959b9168f6324eee3c5f8c049ee63b24dc8a32f40a1d52fdbc34588ff31ff635
                                            • Opcode Fuzzy Hash: fa0caefbeaaf93105c9bb87969c6c0f3ae4e21aeebdf57d47ed4ec090a8a035e
                                            • Instruction Fuzzy Hash: DC332F31D107198EDB11EF68C8806AEF7B1FF99300F15D79AE459A7211EB70AAC5CB81

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 3007 5fb2b10-5fb2b2d 3008 5fb2b2f-5fb2b32 3007->3008 3009 5fb2b3a-5fb2b3d 3008->3009 3010 5fb2b34-5fb2b35 3008->3010 3011 5fb2b3f-5fb2b45 3009->3011 3012 5fb2b50-5fb2b53 3009->3012 3010->3009 3013 5fb2b4b 3011->3013 3014 5fb2c2d-5fb2c3b 3011->3014 3015 5fb2b61-5fb2b64 3012->3015 3016 5fb2b55-5fb2b5c 3012->3016 3013->3012 3021 5fb2c42-5fb2c45 3014->3021 3017 5fb2b81-5fb2b84 3015->3017 3018 5fb2b66-5fb2b7c 3015->3018 3016->3015 3019 5fb2b8e-5fb2b91 3017->3019 3020 5fb2b86-5fb2b89 3017->3020 3018->3017 3024 5fb2b93-5fb2b99 3019->3024 3025 5fb2ba0-5fb2ba3 3019->3025 3020->3019 3022 5fb2c4a-5fb2c4d 3021->3022 3026 5fb2c4f-5fb2c61 3022->3026 3027 5fb2c66-5fb2c69 3022->3027 3028 5fb2b9b 3024->3028 3029 5fb2bdf-5fb2be5 3024->3029 3030 5fb2bb3-5fb2bb6 3025->3030 3031 5fb2ba5-5fb2bac 3025->3031 3026->3027 3034 5fb2c6b-5fb2c7c 3027->3034 3035 5fb2c81-5fb2c84 3027->3035 3028->3025 3036 5fb2beb-5fb2bf6 3029->3036 3037 5fb2cfc-5fb2d2b 3029->3037 3032 5fb2bb8-5fb2bbc 3030->3032 3033 5fb2bc7-5fb2bca 3030->3033 3031->3020 3038 5fb2bae 3031->3038 3039 5fb2cee-5fb2cfb 3032->3039 3040 5fb2bc2 3032->3040 3041 5fb2bcc-5fb2bce 3033->3041 3042 5fb2bd1-5fb2bd4 3033->3042 3034->3035 3045 5fb2c9b-5fb2c9e 3035->3045 3046 5fb2c86-5fb2c96 3035->3046 3036->3037 3044 5fb2bfc-5fb2c09 3036->3044 3060 5fb2d35-5fb2d38 3037->3060 3038->3030 3040->3033 3041->3042 3042->3011 3047 5fb2bda-5fb2bdd 3042->3047 3044->3037 3049 5fb2c0f-5fb2c13 3044->3049 3051 5fb2ca0-5fb2cbf 3045->3051 3052 5fb2cc4-5fb2cc7 3045->3052 3046->3045 3047->3029 3055 5fb2c18-5fb2c1b 3047->3055 3049->3055 3051->3052 3053 5fb2cc9-5fb2cd2 3052->3053 3054 5fb2cd3-5fb2cd6 3052->3054 3054->3024 3057 5fb2cdc-5fb2cde 3054->3057 3058 5fb2c28-5fb2c2b 3055->3058 3059 5fb2c1d-5fb2c23 3055->3059 3062 5fb2ce0 3057->3062 3063 5fb2ce5-5fb2ce8 3057->3063 3058->3014 3058->3022 3059->3058 3064 5fb2d5a-5fb2d5d 3060->3064 3065 5fb2d3a-5fb2d3e 3060->3065 3062->3063 3063->3008 3063->3039 3067 5fb2d7f-5fb2d82 3064->3067 3068 5fb2d5f-5fb2d63 3064->3068 3069 5fb2e2a-5fb2e64 3065->3069 3070 5fb2d44-5fb2d4c 3065->3070 3073 5fb2da4-5fb2da7 3067->3073 3074 5fb2d84-5fb2d88 3067->3074 3068->3069 3072 5fb2d69-5fb2d71 3068->3072 3080 5fb2e66-5fb2e69 3069->3080 3070->3069 3071 5fb2d52-5fb2d55 3070->3071 3071->3064 3072->3069 3076 5fb2d77-5fb2d7a 3072->3076 3078 5fb2da9-5fb2db0 3073->3078 3079 5fb2db7-5fb2dba 3073->3079 3074->3069 3077 5fb2d8e-5fb2d96 3074->3077 3076->3067 3077->3069 3081 5fb2d9c-5fb2d9f 3077->3081 3082 5fb2e22-5fb2e29 3078->3082 3083 5fb2db2 3078->3083 3084 5fb2dbc-5fb2dc3 3079->3084 3085 5fb2dc4-5fb2dc7 3079->3085 3086 5fb2e6f-5fb3003 3080->3086 3087 5fb3152-5fb3155 3080->3087 3081->3073 3083->3079 3088 5fb2dc9-5fb2dcd 3085->3088 3089 5fb2de1-5fb2de4 3085->3089 3156 5fb3009-5fb3010 3086->3156 3157 5fb313c-5fb314f 3086->3157 3093 5fb316f-5fb3172 3087->3093 3094 5fb3157-5fb3168 3087->3094 3088->3069 3090 5fb2dcf-5fb2dd7 3088->3090 3091 5fb2dfc-5fb2dff 3089->3091 3092 5fb2de6-5fb2df7 3089->3092 3090->3069 3095 5fb2dd9-5fb2ddc 3090->3095 3099 5fb2e01-5fb2e0b 3091->3099 3100 5fb2e10-5fb2e12 3091->3100 3092->3091 3096 5fb318c-5fb318f 3093->3096 3097 5fb3174-5fb3185 3093->3097 3106 5fb316a 3094->3106 3107 5fb31a3-5fb31aa 3094->3107 3095->3089 3096->3086 3103 5fb3195-5fb3198 3096->3103 3097->3107 3112 5fb3187 3097->3112 3099->3100 3104 5fb2e19-5fb2e1c 3100->3104 3105 5fb2e14 3100->3105 3103->3086 3110 5fb319e-5fb31a1 3103->3110 3104->3060 3104->3082 3105->3104 3106->3093 3113 5fb31af-5fb31b2 3107->3113 3110->3107 3110->3113 3112->3096 3115 5fb31cc-5fb31cf 3113->3115 3116 5fb31b4-5fb31c5 3113->3116 3117 5fb31dd-5fb31e0 3115->3117 3118 5fb31d1-5fb31d8 3115->3118 3116->3107 3125 5fb31c7 3116->3125 3119 5fb31fe-5fb3201 3117->3119 3120 5fb31e2-5fb31f3 3117->3120 3118->3117 3123 5fb321b-5fb321e 3119->3123 3124 5fb3203-5fb3214 3119->3124 3120->3097 3130 5fb31f9 3120->3130 3128 5fb3228-5fb322b 3123->3128 3129 5fb3220-5fb3225 3123->3129 3132 5fb322d-5fb3240 3124->3132 3136 5fb3216 3124->3136 3125->3115 3128->3132 3133 5fb3243-5fb3245 3128->3133 3129->3128 3130->3119 3134 5fb324c-5fb324f 3133->3134 3135 5fb3247 3133->3135 3134->3080 3139 5fb3255-5fb325e 3134->3139 3135->3134 3136->3123 3158 5fb3016-5fb3049 3156->3158 3159 5fb30c4-5fb30cb 3156->3159 3170 5fb304b 3158->3170 3171 5fb304e-5fb308f 3158->3171 3159->3157 3161 5fb30cd-5fb3100 3159->3161 3172 5fb3102 3161->3172 3173 5fb3105-5fb3132 3161->3173 3170->3171 3181 5fb3091-5fb30a2 3171->3181 3182 5fb30a7-5fb30b8 3171->3182 3172->3173 3173->3139 3173->3157 3181->3139 3182->3139
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2497380955.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5fb0000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $
                                            • API String ID: 0-3993045852
                                            • Opcode ID: 044909f0fd43fd9d8d6b191534bc408067edfc5b6bf03e42f08b279c947b7ac5
                                            • Instruction ID: 8227b93c0f5289bcf7362604adf50eeae75a7fd3766152fbb5303ddf73a39f17
                                            • Opcode Fuzzy Hash: 044909f0fd43fd9d8d6b191534bc408067edfc5b6bf03e42f08b279c947b7ac5
                                            • Instruction Fuzzy Hash: E9227E75E002159FEF24DBA9C490BEEBBB2FF85310F248569D805AB394DA79DC41CB90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 3185 5fbbd40-5fbbd59 3186 5fbbd5b-5fbbd5e 3185->3186 3187 5fbbd81-5fbbd84 3186->3187 3188 5fbbd60-5fbbd7c 3186->3188 3189 5fbbda1-5fbbda4 3187->3189 3190 5fbbd86-5fbbd8f 3187->3190 3188->3187 3193 5fbbdae-5fbbdb1 3189->3193 3194 5fbbda6-5fbbdab 3189->3194 3191 5fbbd95-5fbbd9c 3190->3191 3192 5fbbfe4-5fbbff0 3190->3192 3191->3189 3203 5fbbffb-5fbc01b 3192->3203 3204 5fbbff2-5fbbff9 3192->3204 3196 5fbbdb3 3193->3196 3197 5fbbdc1-5fbbdc4 3193->3197 3194->3193 3205 5fbbdb9-5fbbdbc 3196->3205 3200 5fbbfca-5fbbfd3 3197->3200 3201 5fbbdca-5fbbdcc 3197->3201 3200->3190 3202 5fbbfd9-5fbbfe3 3200->3202 3206 5fbbdce 3201->3206 3207 5fbbdd3-5fbbdd6 3201->3207 3208 5fbc01d-5fbc020 3203->3208 3204->3203 3205->3197 3206->3207 3207->3186 3209 5fbbdd8-5fbbe8c 3207->3209 3210 5fbc039-5fbc03c 3208->3210 3211 5fbc022-5fbc034 3208->3211 3323 5fbbf88-5fbbfac 3209->3323 3324 5fbbe92-5fbbe9d 3209->3324 3213 5fbc03e-5fbc03f 3210->3213 3214 5fbc044-5fbc047 3210->3214 3211->3210 3213->3214 3215 5fbc049-5fbc04f 3214->3215 3216 5fbc054-5fbc057 3214->3216 3215->3216 3218 5fbc059-5fbc063 3216->3218 3219 5fbc068-5fbc06b 3216->3219 3218->3219 3221 5fbc078-5fbc07b 3219->3221 3222 5fbc06d-5fbc073 3219->3222 3225 5fbc09f-5fbc0a2 3221->3225 3226 5fbc07d-5fbc098 3221->3226 3222->3221 3227 5fbc0b8-5fbc0bb 3225->3227 3228 5fbc0a4-5fbc0ad 3225->3228 3226->3213 3252 5fbc09a 3226->3252 3231 5fbc0bd-5fbc0cc 3227->3231 3232 5fbc0d3-5fbc0d6 3227->3232 3229 5fbc16f-5fbc178 3228->3229 3230 5fbc0b3 3228->3230 3235 5fbc17e-5fbc185 3229->3235 3236 5fbc215-5fbc24e 3229->3236 3230->3227 3248 5fbc121-5fbc124 3231->3248 3249 5fbc0ce 3231->3249 3237 5fbc0f9-5fbc0fc 3232->3237 3238 5fbc0d8-5fbc0f4 3232->3238 3239 5fbc18a-5fbc18d 3235->3239 3258 5fbc250-5fbc253 3236->3258 3243 5fbc0fe-5fbc117 3237->3243 3244 5fbc11c-5fbc11f 3237->3244 3238->3237 3245 5fbc1ba-5fbc1bd 3239->3245 3246 5fbc18f-5fbc1b5 3239->3246 3243->3244 3247 5fbc129-5fbc12c 3244->3247 3244->3248 3255 5fbc1bf-5fbc1e2 3245->3255 3256 5fbc1e7-5fbc1ea 3245->3256 3246->3245 3253 5fbc12e-5fbc131 3247->3253 3254 5fbc140-5fbc143 3247->3254 3248->3247 3249->3232 3252->3225 3253->3236 3263 5fbc137-5fbc13b 3253->3263 3264 5fbc157-5fbc15a 3254->3264 3265 5fbc145-5fbc148 3254->3265 3255->3256 3260 5fbc1ec-5fbc1ee 3256->3260 3261 5fbc1f1-5fbc1f3 3256->3261 3267 5fbc260-5fbc263 3258->3267 3268 5fbc255-5fbc25f 3258->3268 3260->3261 3270 5fbc1fa-5fbc1fd 3261->3270 3271 5fbc1f5 3261->3271 3263->3254 3264->3253 3274 5fbc15c 3264->3274 3272 5fbc14a-5fbc14f 3265->3272 3273 5fbc152-5fbc155 3265->3273 3277 5fbc286-5fbc289 3267->3277 3278 5fbc265-5fbc281 3267->3278 3270->3208 3281 5fbc203-5fbc214 3270->3281 3271->3270 3272->3273 3273->3264 3283 5fbc161-5fbc164 3273->3283 3274->3283 3279 5fbc28b-5fbc299 3277->3279 3280 5fbc2a0-5fbc2a3 3277->3280 3278->3277 3295 5fbc2d5-5fbc302 3279->3295 3299 5fbc29b 3279->3299 3284 5fbc2c3-5fbc2c5 3280->3284 3285 5fbc2a5-5fbc2be 3280->3285 3283->3228 3286 5fbc16a-5fbc16d 3283->3286 3293 5fbc2cc-5fbc2cf 3284->3293 3294 5fbc2c7 3284->3294 3285->3284 3286->3229 3286->3239 3293->3258 3293->3295 3294->3293 3308 5fbc308-5fbc32a 3295->3308 3309 5fbc491-5fbc496 3295->3309 3299->3280 3313 5fbc49b-5fbc4a5 3308->3313 3314 5fbc330-5fbc339 3308->3314 3309->3313 3314->3309 3316 5fbc33f-5fbc347 3314->3316 3317 5fbc47d-5fbc489 3316->3317 3318 5fbc34d-5fbc366 3316->3318 3317->3314 3320 5fbc48f 3317->3320 3327 5fbc36c-5fbc393 3318->3327 3328 5fbc473-5fbc478 3318->3328 3320->3313 3337 5fbbfae 3323->3337 3338 5fbbfb6 3323->3338 3330 5fbbe9f-5fbbea5 3324->3330 3331 5fbbeb5-5fbbf82 call 5fb3f30 3324->3331 3327->3328 3342 5fbc399-5fbc3c1 3327->3342 3328->3317 3334 5fbbea9-5fbbeab 3330->3334 3335 5fbbea7 3330->3335 3331->3323 3331->3324 3334->3331 3335->3331 3337->3338 3338->3200 3342->3328 3348 5fbc3c7-5fbc3e1 3342->3348 3348->3328 3352 5fbc3e7-5fbc403 3348->3352 3352->3328 3357 5fbc405-5fbc424 3352->3357 3357->3328 3362 5fbc426-5fbc471 call 5fb3f30 3357->3362 3362->3317
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2497380955.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5fb0000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: PHq
                                            • API String ID: 0-3820536768
                                            • Opcode ID: 2b35bb5dc6f3a2b143e2f45cee1ece36687313ab5934bd97588536433b1ef009
                                            • Instruction ID: a7c98cbd029327bea698a9328909aab3aab98a9802674002691a8bd8a9d05f5a
                                            • Opcode Fuzzy Hash: 2b35bb5dc6f3a2b143e2f45cee1ece36687313ab5934bd97588536433b1ef009
                                            • Instruction Fuzzy Hash: DA22AF30B00205CFEB24DB69D494BAEB7A2FF89310F248569E406DB365DB79EC45CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \Vmm
                                            • API String ID: 0-738080011
                                            • Opcode ID: b438915d8da211330b2e4da50480126bfe2a2bcd20b08b120e6f5f2bb7c2e0c5
                                            • Instruction ID: 62668cdda545ef9abbb98efbcb47466a87e7a657be284adb7255eaa6cdfa1a7c
                                            • Opcode Fuzzy Hash: b438915d8da211330b2e4da50480126bfe2a2bcd20b08b120e6f5f2bb7c2e0c5
                                            • Instruction Fuzzy Hash: F5916C70E00349CFEF24CFA9D88579EBBF2AF88314F248129E415A7294DB759946CF81
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2497380955.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5fb0000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 78275c394352d9a2c3c16881dbaa616ba0995d7a0d396398a16e1c55696bd512
                                            • Instruction ID: d52202edaa1496afd4396eb7b3f1f310691437889df5a3c42ab4a8ed1ac9352e
                                            • Opcode Fuzzy Hash: 78275c394352d9a2c3c16881dbaa616ba0995d7a0d396398a16e1c55696bd512
                                            • Instruction Fuzzy Hash: 15623734A00204DBEF14DB69D698BADBBB3FB84310F148569E816DB395DB79EC46CB40
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2497380955.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5fb0000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 79740c349d41deec6d1a05349bdecfc3e53e97a13b33bbd454414ca3d9c1790a
                                            • Instruction ID: 3abf2f2ca8658aba651df9950fe933f883ecc4780581f29e00c976f38fbefb8a
                                            • Opcode Fuzzy Hash: 79740c349d41deec6d1a05349bdecfc3e53e97a13b33bbd454414ca3d9c1790a
                                            • Instruction Fuzzy Hash: 4B328034B00204DFEB24EB69D990BEDBBB2FB88311F108525E545DB359DB79EC428B91
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ee0e078825c2afad4aa60493b7727a95a866b49a9821255d0eeecb6bfeab00a0
                                            • Instruction ID: 772b653482354bfc07f3cbb8dcfcc1049e2633857c33730863b84c6e562318b2
                                            • Opcode Fuzzy Hash: ee0e078825c2afad4aa60493b7727a95a866b49a9821255d0eeecb6bfeab00a0
                                            • Instruction Fuzzy Hash: 79325B75A002148FDB14DF68D584BAEBBB2EF88310F248569E809DB394DB35ED45CB91
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 47eaf81afcb0f8b0465ce5553019fc2063ebfea94b697b1fe75a682740f04bd8
                                            • Instruction ID: bef2821c4dee682cc73cba7a43fb15ec488a7acac0dff39fd58271ff5ea1cc1e
                                            • Opcode Fuzzy Hash: 47eaf81afcb0f8b0465ce5553019fc2063ebfea94b697b1fe75a682740f04bd8
                                            • Instruction Fuzzy Hash: A5B14F70E007098FDB28CFA9D88579EBBF2AF88314F248529D815E7294EF749945CF91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1867 2c44804-2c4489c 1871 2c448e6-2c448e8 1867->1871 1872 2c4489e-2c448a9 1867->1872 1873 2c448ea-2c44902 1871->1873 1872->1871 1874 2c448ab-2c448b7 1872->1874 1881 2c44904-2c4490f 1873->1881 1882 2c4494c-2c4494e 1873->1882 1875 2c448b9-2c448c3 1874->1875 1876 2c448da-2c448e4 1874->1876 1878 2c448c5 1875->1878 1879 2c448c7-2c448d6 1875->1879 1876->1873 1878->1879 1879->1879 1880 2c448d8 1879->1880 1880->1876 1881->1882 1884 2c44911-2c4491d 1881->1884 1883 2c44950-2c44962 1882->1883 1891 2c44969-2c44995 1883->1891 1885 2c44940-2c4494a 1884->1885 1886 2c4491f-2c44929 1884->1886 1885->1883 1887 2c4492d-2c4493c 1886->1887 1888 2c4492b 1886->1888 1887->1887 1890 2c4493e 1887->1890 1888->1887 1890->1885 1892 2c4499b-2c449a9 1891->1892 1893 2c449b2-2c44a0f 1892->1893 1894 2c449ab-2c449b1 1892->1894 1901 2c44a11-2c44a15 1893->1901 1902 2c44a1f-2c44a23 1893->1902 1894->1893 1901->1902 1903 2c44a17-2c44a1a call 2c40ab8 1901->1903 1904 2c44a25-2c44a29 1902->1904 1905 2c44a33-2c44a37 1902->1905 1903->1902 1904->1905 1907 2c44a2b-2c44a2e call 2c40ab8 1904->1907 1908 2c44a47-2c44a4b 1905->1908 1909 2c44a39-2c44a3d 1905->1909 1907->1905 1910 2c44a4d-2c44a51 1908->1910 1911 2c44a5b 1908->1911 1909->1908 1913 2c44a3f 1909->1913 1910->1911 1914 2c44a53 1910->1914 1915 2c44a5c 1911->1915 1913->1908 1914->1911 1915->1915
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \Vmm$\Vmm
                                            • API String ID: 0-2178289407
                                            • Opcode ID: 1846cd5ba5be1f27b4d839866fd02739eec2b0354d89d8378d47d2dbb23fcbd8
                                            • Instruction ID: 537372f34d4cc0e833fd7f836bc841766a70978aa842d255949c111d657197b8
                                            • Opcode Fuzzy Hash: 1846cd5ba5be1f27b4d839866fd02739eec2b0354d89d8378d47d2dbb23fcbd8
                                            • Instruction Fuzzy Hash: DB816A70D00249DFDF28CFA9D880B9EBBF2BF88314F24852AE415A7294DB749981CF51

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1916 2c44810-2c4489c 1919 2c448e6-2c448e8 1916->1919 1920 2c4489e-2c448a9 1916->1920 1921 2c448ea-2c44902 1919->1921 1920->1919 1922 2c448ab-2c448b7 1920->1922 1929 2c44904-2c4490f 1921->1929 1930 2c4494c-2c4494e 1921->1930 1923 2c448b9-2c448c3 1922->1923 1924 2c448da-2c448e4 1922->1924 1926 2c448c5 1923->1926 1927 2c448c7-2c448d6 1923->1927 1924->1921 1926->1927 1927->1927 1928 2c448d8 1927->1928 1928->1924 1929->1930 1932 2c44911-2c4491d 1929->1932 1931 2c44950-2c44995 1930->1931 1940 2c4499b-2c449a9 1931->1940 1933 2c44940-2c4494a 1932->1933 1934 2c4491f-2c44929 1932->1934 1933->1931 1935 2c4492d-2c4493c 1934->1935 1936 2c4492b 1934->1936 1935->1935 1938 2c4493e 1935->1938 1936->1935 1938->1933 1941 2c449b2-2c44a0f 1940->1941 1942 2c449ab-2c449b1 1940->1942 1949 2c44a11-2c44a15 1941->1949 1950 2c44a1f-2c44a23 1941->1950 1942->1941 1949->1950 1951 2c44a17-2c44a1a call 2c40ab8 1949->1951 1952 2c44a25-2c44a29 1950->1952 1953 2c44a33-2c44a37 1950->1953 1951->1950 1952->1953 1955 2c44a2b-2c44a2e call 2c40ab8 1952->1955 1956 2c44a47-2c44a4b 1953->1956 1957 2c44a39-2c44a3d 1953->1957 1955->1953 1958 2c44a4d-2c44a51 1956->1958 1959 2c44a5b 1956->1959 1957->1956 1961 2c44a3f 1957->1961 1958->1959 1962 2c44a53 1958->1962 1963 2c44a5c 1959->1963 1961->1956 1962->1959 1963->1963
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \Vmm$\Vmm
                                            • API String ID: 0-2178289407
                                            • Opcode ID: 1c1717db678bdbbe908c55a0e22247ffede9ae1956868fb4f62676130c6d6b01
                                            • Instruction ID: 4fe00abe859567a782d61bcc664cc15e55d54565030f34a0400bd1fa9776b037
                                            • Opcode Fuzzy Hash: 1c1717db678bdbbe908c55a0e22247ffede9ae1956868fb4f62676130c6d6b01
                                            • Instruction Fuzzy Hash: 88715A70E002499FDB28DFA9C88079EBBF2BF88314F248129E415AB294DB749841DF95

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2032 2c46ed8-2c46f42 call 2c46c40 2041 2c46f44-2c46f5d call 2c4637c 2032->2041 2042 2c46f5e-2c46f8c 2032->2042 2048 2c46f8e-2c46f91 2042->2048 2049 2c46fc4-2c46fc7 2048->2049 2050 2c46f93-2c46fa7 2048->2050 2051 2c47003-2c47006 2049->2051 2052 2c46fc9-2c46ffe 2049->2052 2056 2c46fad 2050->2056 2057 2c46fa9-2c46fab 2050->2057 2053 2c47016-2c47019 2051->2053 2054 2c47008 2051->2054 2052->2051 2058 2c4702d-2c4702f 2053->2058 2059 2c4701b-2c47022 2053->2059 2076 2c47008 call 2c480f1 2054->2076 2077 2c47008 call 2c47908 2054->2077 2078 2c47008 call 2c47918 2054->2078 2060 2c46fb0-2c46fbf 2056->2060 2057->2060 2064 2c47036-2c47039 2058->2064 2065 2c47031 2058->2065 2062 2c47028 2059->2062 2063 2c470eb-2c470f1 2059->2063 2060->2049 2061 2c4700e-2c47011 2061->2053 2062->2058 2064->2048 2066 2c4703f-2c4704e 2064->2066 2065->2064 2069 2c47050-2c47053 2066->2069 2070 2c47078-2c4708e 2066->2070 2072 2c4705b-2c47076 2069->2072 2070->2063 2072->2069 2072->2070 2076->2061 2077->2061 2078->2061
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LRq$LRq
                                            • API String ID: 0-3710822783
                                            • Opcode ID: cb00da734908aab8c9135a0d8efd8ad0d7e0b3ea0f4f16539967e4d0d9ed8c48
                                            • Instruction ID: 6621975142695f59891192bbdffcbb4f8bdca256d60ba2e133239df4b3b5e51a
                                            • Opcode Fuzzy Hash: cb00da734908aab8c9135a0d8efd8ad0d7e0b3ea0f4f16539967e4d0d9ed8c48
                                            • Instruction Fuzzy Hash: EB41D230A002189FDB15DB68C4507AEBBB6EF86300F20856AE801EB394EF75AD45CB91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 3379 5fbe1f0-5fbe1fb 3380 5fbe1fd-5fbe224 call 5fbd5e0 3379->3380 3381 5fbe225-5fbe244 call 5fbd5ec 3379->3381 3387 5fbe24a-5fbe2a9 3381->3387 3388 5fbe246-5fbe249 3381->3388 3395 5fbe2ab-5fbe2ae 3387->3395 3396 5fbe2af-5fbe33c GlobalMemoryStatusEx 3387->3396 3400 5fbe33e-5fbe344 3396->3400 3401 5fbe345-5fbe36d 3396->3401 3400->3401
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2497380955.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5fb0000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 591e94433ace00b3852c3c93f339370b203363278f0faf8627298a250941b415
                                            • Instruction ID: b0ba4a9eb68a4dd2459bf610ee26ce4e7e17d7bbe1f20350e1a1b2424b4ddb08
                                            • Opcode Fuzzy Hash: 591e94433ace00b3852c3c93f339370b203363278f0faf8627298a250941b415
                                            • Instruction Fuzzy Hash: 78412132E043598FEB14DFAAC8007DEBBB5AF89210F04856AD904E7240DB789845CBE0
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,05FBE242), ref: 05FBE32F
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2497380955.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5fb0000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: b7a22c57609dac76d7e965a20c2a81193964128bf85ba193ce1eead79d9d0b2e
                                            • Instruction ID: b3d7826bac72ac9ea3daa0883bd4a67f97ddd58ce91c22a0a1bda9e1b9510a35
                                            • Opcode Fuzzy Hash: b7a22c57609dac76d7e965a20c2a81193964128bf85ba193ce1eead79d9d0b2e
                                            • Instruction Fuzzy Hash: E41117B1C006599BDB10DF9AC444BDEFBF4EF48320F14816AE918B7240D778A945CFA1
                                            APIs
                                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,05FBE242), ref: 05FBE32F
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2497380955.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5fb0000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID: GlobalMemoryStatus
                                            • String ID:
                                            • API String ID: 1890195054-0
                                            • Opcode ID: d6640a3668c08b2752849c9ece706060b258bb2e51c2768c7bd40c0c91973d16
                                            • Instruction ID: 0cdf0039694e8752326402fd77e711313ff2580fc8961629ce672ba2fb4b506a
                                            • Opcode Fuzzy Hash: d6640a3668c08b2752849c9ece706060b258bb2e51c2768c7bd40c0c91973d16
                                            • Instruction Fuzzy Hash: 7F1114B1C002599FDB10DF9AC445BDEFBF4AF48320F14822AE918A7240D778A945CFA5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \Vmm
                                            • API String ID: 0-738080011
                                            • Opcode ID: 65ea194c7dd2013503ddd6d292f37d6ec7216ec27402c8a6dd1a66e468a49c1c
                                            • Instruction ID: 1d972138b2c65fddbe391a9eb4c974d6c661572b50708d7512762d78f7cc3ab7
                                            • Opcode Fuzzy Hash: 65ea194c7dd2013503ddd6d292f37d6ec7216ec27402c8a6dd1a66e468a49c1c
                                            • Instruction Fuzzy Hash: DA916A70E00249CFEF24CFA9D9857DEBBF2AF88314F248129E815A7294DB759945CF81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: PHq
                                            • API String ID: 0-3820536768
                                            • Opcode ID: edb8f126aa3f89d94375483cb3a22ac2537728ef6c1808e08d20ca24fe8bfe2e
                                            • Instruction ID: 0d49518f54e19b0e42531de5c917919147ddaaa108245afa851264a44b2bdc01
                                            • Opcode Fuzzy Hash: edb8f126aa3f89d94375483cb3a22ac2537728ef6c1808e08d20ca24fe8bfe2e
                                            • Instruction Fuzzy Hash: A531CB30B002059FDB29AF3495A07AF7BA2AF88210F24566DE406DB798DF35DD46CB90
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: PHq
                                            • API String ID: 0-3820536768
                                            • Opcode ID: 49e2cf1cb2eb5c83a272983e22249031a034620360d44b1a5ba75809bec583eb
                                            • Instruction ID: 4e94bb1c0db44a3922f25ea144d226d02958ca88a21912b648fd67680c120f35
                                            • Opcode Fuzzy Hash: 49e2cf1cb2eb5c83a272983e22249031a034620360d44b1a5ba75809bec583eb
                                            • Instruction Fuzzy Hash: 0F31AB30B002059BDB29AF3595647AF7BA2AFC8210F24456DE406DB388EF35ED02CB90
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LRq
                                            • API String ID: 0-3187445251
                                            • Opcode ID: 460b56c216177e4a34ffee1fa1439f2f476346f8483957f90641ee680424d440
                                            • Instruction ID: ff61a8cd16dd530ad065b5d62426750d170424300ee49ec81119506a193f625e
                                            • Opcode Fuzzy Hash: 460b56c216177e4a34ffee1fa1439f2f476346f8483957f90641ee680424d440
                                            • Instruction Fuzzy Hash: FD315C30E11209DBEB14CFA9C48479EF7B5EF85310F208529E801EB240EF71AE45CB90
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LRq
                                            • API String ID: 0-3187445251
                                            • Opcode ID: efd5d40f2e61cd3dbf07de4ed4b833ea9b30306bbc437897cf36e245e0d1d20b
                                            • Instruction ID: b6f177383fd6cfdb7439cd25ee3d813377d8ad70437676df83a9d98158d191d3
                                            • Opcode Fuzzy Hash: efd5d40f2e61cd3dbf07de4ed4b833ea9b30306bbc437897cf36e245e0d1d20b
                                            • Instruction Fuzzy Hash: 2A01F5327042105FC705ABB8D5517EE7BA6EF86311F64456AD006CB794DF3989418B91
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 304f10d0f63cc97c004a96b3a15cfbf6cdf9f11d845181d69afcf60713fadd08
                                            • Instruction ID: 56baee1647b791efec6966708c2cb62fec867fa747163801960d0c4c191ca602
                                            • Opcode Fuzzy Hash: 304f10d0f63cc97c004a96b3a15cfbf6cdf9f11d845181d69afcf60713fadd08
                                            • Instruction Fuzzy Hash: EE126C34710202DFDB25AB28E5A936D76A3FBC5241F606A29E805CF344DF71FC4A8B81
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8c63e6e5a7fe339597d4f9927b36d43cc5ac444bbb40c340ade9686e74ff074a
                                            • Instruction ID: 48e3ffff5626d0700473abc402a4375344cf56a4f271319b6d1b14088b28d6de
                                            • Opcode Fuzzy Hash: 8c63e6e5a7fe339597d4f9927b36d43cc5ac444bbb40c340ade9686e74ff074a
                                            • Instruction Fuzzy Hash: 6E126B34710202DFDB25AB28E4A876D76A3FBC5241F606A29E905CF344DF71FC4A8B81
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c8a7f383e4eb0ca4258eab301eeea5b4f9e396f9a9cb06c60d5a6753e0301c5c
                                            • Instruction ID: 4b3a021cd0fc9618d7b45e064c9c8477eced908dcc98d699b8e79d04125d7eb8
                                            • Opcode Fuzzy Hash: c8a7f383e4eb0ca4258eab301eeea5b4f9e396f9a9cb06c60d5a6753e0301c5c
                                            • Instruction Fuzzy Hash: A6A15E70E00609CFDB28CFA9D8857DEBBF2AF88314F248529D815E7294EB749945CF91
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c8ebda2d163711f394c005c9b07a7750b3e1d87e18703af07e52a3a19207ffe6
                                            • Instruction ID: 4c56b52bd48b4cdb798f340c54e46ceb2fa8d5c914df2aad6d02884d752ed1d9
                                            • Opcode Fuzzy Hash: c8ebda2d163711f394c005c9b07a7750b3e1d87e18703af07e52a3a19207ffe6
                                            • Instruction Fuzzy Hash: 8D914D35A002149FCB15DFA8D584BAEBBB2EF88310F248565E806DB394DF35ED46CB50
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5b94d713dd0df179191c3f36887b78739178d065de0cf02850440cea710996ff
                                            • Instruction ID: 1db4b06e1116f466cd3d13cad290b170fc22bb8af5b23105f007ac02e086feef
                                            • Opcode Fuzzy Hash: 5b94d713dd0df179191c3f36887b78739178d065de0cf02850440cea710996ff
                                            • Instruction Fuzzy Hash: 0F5134B0D002588FDB18DFAAC885B9EBBF5BF49304F24812AE815BB355DB749944CF90
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b05c37044713871ec7e58339147bed7edf05f5bfea80c7d6991070086928cf4d
                                            • Instruction ID: f99bf6f11420b1710dd8b268ef8010fa3b6c7667cf096d48f43d5bbffd815e65
                                            • Opcode Fuzzy Hash: b05c37044713871ec7e58339147bed7edf05f5bfea80c7d6991070086928cf4d
                                            • Instruction Fuzzy Hash: D4512470D002588FDB18DFAAC884B9EBBF5BF49314F258129E815BB355DB74A844CF94
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0083052538cea9be457cb867313460eec6a72b6ab69c6a21b71b15743abada17
                                            • Instruction ID: 8f4055a77ee2a53f344a7deb0bcc9f0b8dcbf8b2d69a7ea3fc2bee8ab0fb17e4
                                            • Opcode Fuzzy Hash: 0083052538cea9be457cb867313460eec6a72b6ab69c6a21b71b15743abada17
                                            • Instruction Fuzzy Hash: 42512D355012968FD726FF28F890BA83F75F7923057048969D854CB27EDA716D09CF82
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f761626ea47c8550c78528afed7141b93e040c1d0bf66f6175d13697168cd211
                                            • Instruction ID: 6074ac5c18e19932ea6aea306c4fc98f13c998e54bea5c5ab136294fa26cea47
                                            • Opcode Fuzzy Hash: f761626ea47c8550c78528afed7141b93e040c1d0bf66f6175d13697168cd211
                                            • Instruction Fuzzy Hash: 4651EC345012A68FD726FF28F890BA83F65F7913057148969D854CF27EDA706D09CF81
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f42c5d9627656a075741d4f23b24ccd1be257c97fc70bc4546793af80c90d794
                                            • Instruction ID: cd66ed2cea08825f5a1b44c9ad2b67134ff95e77b237e94dd1d750e4187894f0
                                            • Opcode Fuzzy Hash: f42c5d9627656a075741d4f23b24ccd1be257c97fc70bc4546793af80c90d794
                                            • Instruction Fuzzy Hash: 0C315E35E106059FDB19CF64D49479EB7B2BF89300F509919E806EB754DF70AD468B40
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e77a23cf0191231231a90b959cd703343c17ad6da8cd3f649dc201aeeb325d0a
                                            • Instruction ID: 1a47c6b110ff04d834ac25781cb842cb943cb542bece7db0ace6cb8ff37400b2
                                            • Opcode Fuzzy Hash: e77a23cf0191231231a90b959cd703343c17ad6da8cd3f649dc201aeeb325d0a
                                            • Instruction Fuzzy Hash: EA41FEB1D003499FEB14DFA9C881ADEBBB5FF48314F148029E819AB250DB75A946CF91
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b34b4976ff121f1055ac887cab83ca822694df248d4d30349a56df7ac998d815
                                            • Instruction ID: 5d326461f2eb9308b41b77ae04a4492b810a40497485783e68a799878366e97b
                                            • Opcode Fuzzy Hash: b34b4976ff121f1055ac887cab83ca822694df248d4d30349a56df7ac998d815
                                            • Instruction Fuzzy Hash: 42315830A002148FDB29EB78D9547AE77B6EF89388F900468D806EB394DF76DD41CB91
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1b90f55cfad3739cf67a16b6372a4e64a2eec3110122980e65cc5cee28aee725
                                            • Instruction ID: f85495d6427f36513c35ef80aacd8c9da2995cdcf7f9aa49603cff6c59ded55e
                                            • Opcode Fuzzy Hash: 1b90f55cfad3739cf67a16b6372a4e64a2eec3110122980e65cc5cee28aee725
                                            • Instruction Fuzzy Hash: 9B315830E106099FDB19CF64D4946AEBBB2BF89300F509929E806EB744DF70AD468B40
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c1026eed9d556fdc3883c7961f10c595d6f0386f6d1e2f25edf9715ee5a0868d
                                            • Instruction ID: 6f7daa95923ba0a5c16c804041acd1f6c89c29197452e3e31cd1d01477a9f4c3
                                            • Opcode Fuzzy Hash: c1026eed9d556fdc3883c7961f10c595d6f0386f6d1e2f25edf9715ee5a0868d
                                            • Instruction Fuzzy Hash: 4241EEB1D0034D9FEB14DFA9C481A9EBBB5FF48314F108029E819AB250DB75A946CF91
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8b7b2ac516804c3d092eb85943623af0216c7c89cdb3ddadbad2813ea6621f79
                                            • Instruction ID: e8e7807696416e846095c1a45fc1def57c1dce92ca0c90e2821a8b4c14950e54
                                            • Opcode Fuzzy Hash: 8b7b2ac516804c3d092eb85943623af0216c7c89cdb3ddadbad2813ea6621f79
                                            • Instruction Fuzzy Hash: 5D316834A002148FDB28EB74D9547AE77B6AF89344F500468D806EB398DF76DD41CB91
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5c3ffee8325a8373b9ef40d6a746ff4b385723484af7c708cc89a307b5940a55
                                            • Instruction ID: 09290a9dc565cc3c2a0b829e9072990a93d84f6470745a21e4cf1a5bfe5ab5e5
                                            • Opcode Fuzzy Hash: 5c3ffee8325a8373b9ef40d6a746ff4b385723484af7c708cc89a307b5940a55
                                            • Instruction Fuzzy Hash: 42314F31E002199BDB19DFA5D49079FB7B2EF89304F548629E805EB244DB70AD86CB90
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 920a189e19f448d5ecdadcbc250a30db16aef1a8a337585b63329cecce08c1c2
                                            • Instruction ID: 837e3c9660176c934dfafc240a30ca51706aaadd126fa4868abf2b9c11ed6ff0
                                            • Opcode Fuzzy Hash: 920a189e19f448d5ecdadcbc250a30db16aef1a8a337585b63329cecce08c1c2
                                            • Instruction Fuzzy Hash: 94214D34E1021A9BDB19DFA5D49079FF7B2FF89304F508629E805EB244DB70AD86CB90
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3448958cbaee8bc96b6bcbe164d4f2babd6f0369c2529579710f346b9c7764ec
                                            • Instruction ID: 64bfb837710ab6c9816a69497b96b4723778627054cafb88d3333c73245a3050
                                            • Opcode Fuzzy Hash: 3448958cbaee8bc96b6bcbe164d4f2babd6f0369c2529579710f346b9c7764ec
                                            • Instruction Fuzzy Hash: DC21A738A102504FEF61F768E884B5B3B65E780355F144A25D44ACF25DDF64EE86CBC1
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 68a450835566cdf68f121fa4b4aa8775061601a362433b9765041ed0b3a39213
                                            • Instruction ID: 7e68e585220d75077fce4fabf42e561fcb1f1606195fd436d7b239a002925812
                                            • Opcode Fuzzy Hash: 68a450835566cdf68f121fa4b4aa8775061601a362433b9765041ed0b3a39213
                                            • Instruction Fuzzy Hash: 85210A347002048FDB64DB79D558BAE7BF5EB89244F500468E84AEB3A4DF36AD01CB91
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d86cfdb45d840ae43844e71526aff86b9e05a561029f648bdc4bda602806aaec
                                            • Instruction ID: 371e9ef866835cb6771f7ff60ecff15ce9448a958084fa2beaab1b12c16a1f9a
                                            • Opcode Fuzzy Hash: d86cfdb45d840ae43844e71526aff86b9e05a561029f648bdc4bda602806aaec
                                            • Instruction Fuzzy Hash: 2D215C31B002048FEB24EB65D5547AE77F6EF89204F540468D549FB294DFB69E80CBA1
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 05b000405febd3ea1837870b03f83fcdd4bd95aeec449355b52944bd6018325f
                                            • Instruction ID: 7afcbd6c86d33df764ef86f122093535d54ae004e545badb78ca7126e02ce021
                                            • Opcode Fuzzy Hash: 05b000405febd3ea1837870b03f83fcdd4bd95aeec449355b52944bd6018325f
                                            • Instruction Fuzzy Hash: 52216035E042298BDB19CFA4D85469FBBB2AF89300F10865AEC16FB340DF709946CB50
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2493541773.00000000010CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_10cd000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a3394455c1ae9c11e8df168a416e5d829a4b54e7375a649b314932524be92bd1
                                            • Instruction ID: 8d48568643378f1f2aa5d975246740b185661190dadcaabf8eafc3cbe78b8dd0
                                            • Opcode Fuzzy Hash: a3394455c1ae9c11e8df168a416e5d829a4b54e7375a649b314932524be92bd1
                                            • Instruction Fuzzy Hash: 4121F1716042009FDB15DF58D984B1ABBA1EB84614F30C5BDE88A0B246C336D407CBA2
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 99a95c879ff87ed9919de07ccf45464bb177da191e6325d8cbdc7204f1429567
                                            • Instruction ID: a0e8bb764c6088395c406e860b96248b06f9458c754f449a7dcab344e80f10b1
                                            • Opcode Fuzzy Hash: 99a95c879ff87ed9919de07ccf45464bb177da191e6325d8cbdc7204f1429567
                                            • Instruction Fuzzy Hash: B221E4346102006FEF316674D5993AE3A60F782315F980829F88EDB2C0DFA9DAC4C742
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 45ece67a439560c7c91fb376635448bb9fc2e877f1c63c44518e7a0cc65e38e9
                                            • Instruction ID: 236a71c419b07ac95b013d4135fc86d673167db95b44d21ec9a15b14d88554f3
                                            • Opcode Fuzzy Hash: 45ece67a439560c7c91fb376635448bb9fc2e877f1c63c44518e7a0cc65e38e9
                                            • Instruction Fuzzy Hash: 65215030E002199BDB19CFA5D854A9FB7B2AF89300F10866AEC16FB350EF71AD45CB50
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5ac0a7ce7b822f9ca41a33bc98a622a53b98a3bf2a719a53d81e2bdb0a7f4650
                                            • Instruction ID: 5de8d6888cd8e53d3bfd0f581b630d188965d7e5a790442243f057ad44d5b3ed
                                            • Opcode Fuzzy Hash: 5ac0a7ce7b822f9ca41a33bc98a622a53b98a3bf2a719a53d81e2bdb0a7f4650
                                            • Instruction Fuzzy Hash: CC213930B002048FEB64EB65D5147AE77F6AF89205F140469D54AEB294DFB69D80CBA1
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 45f9a7e041f7827fdf3b8d008e382b50dc80c906da3e74ff0b0f56639688d239
                                            • Instruction ID: e372cdc92cf8e3e23e71d240bcd626c3b194f1f84dfa8efb1266233e6f3937c9
                                            • Opcode Fuzzy Hash: 45f9a7e041f7827fdf3b8d008e382b50dc80c906da3e74ff0b0f56639688d239
                                            • Instruction Fuzzy Hash: 7F21A538A102104FEF61FB64E884B5A3B65EB80345F144A25D44ACF25DDF64ED86CBD1
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3f0e1ec598223e09c663df04ec0d027b71f8388d0a8923644eb4b74d24c0fe83
                                            • Instruction ID: e39b1c9f0b58a50e910f2e9ffa298ce8a2f9d958ec7eaf61a6428f65cf1e8c1b
                                            • Opcode Fuzzy Hash: 3f0e1ec598223e09c663df04ec0d027b71f8388d0a8923644eb4b74d24c0fe83
                                            • Instruction Fuzzy Hash: 8021E9347002048FDB64DB79D558BAE7BF5EB89344F104468E80AEB3A4DF76AD00CB91
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 333b2e9a7f867d0299db908071c6ddb28013e1e2d42a0f9c56db7df07868e533
                                            • Instruction ID: d733e1a8f0ddd587ff5f9ed26a13c9c56cbfc6574aa357661a2864e300e944a9
                                            • Opcode Fuzzy Hash: 333b2e9a7f867d0299db908071c6ddb28013e1e2d42a0f9c56db7df07868e533
                                            • Instruction Fuzzy Hash: 1A11E3B6B003109FDF119BB99884B9F7FE9EB88650F140424E94ADB344EF34C982C791
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2493541773.00000000010CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_10cd000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 74d2787f0fe2ad0f5071bc3e2faeb528cec67b392b24816480e7a67ecb2e4a7e
                                            • Instruction ID: 63911d7b387a0b0ba165f019fea17a80416beab802ee67f5f6049cf9d1ae7228
                                            • Opcode Fuzzy Hash: 74d2787f0fe2ad0f5071bc3e2faeb528cec67b392b24816480e7a67ecb2e4a7e
                                            • Instruction Fuzzy Hash: DD2183755083809FCB02CF58D994715BFB1EB46314F24C5EAD8898B2A7C33A9806CBA2
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cab4ed43d960b6fd9da89cc673bc64eb6cea64819e3aeee32494f83aedbfbf6d
                                            • Instruction ID: f9d90aff77294eea4a963e9877ba4834c95aff741917ce6203b85f0d502cb196
                                            • Opcode Fuzzy Hash: cab4ed43d960b6fd9da89cc673bc64eb6cea64819e3aeee32494f83aedbfbf6d
                                            • Instruction Fuzzy Hash: 8B117034B402098BEF6CAA79D64476B37A5FFC5224F204939E606CF241EF61DD868BC1
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4f9929270bc1f31755c055b6ed1fdceb463332d632c5fb63bb44c20852977cee
                                            • Instruction ID: 8afe133278142b13b6365dd202d3e7215f4044acc5b9066df414e5bfaa20dd60
                                            • Opcode Fuzzy Hash: 4f9929270bc1f31755c055b6ed1fdceb463332d632c5fb63bb44c20852977cee
                                            • Instruction Fuzzy Hash: 2311E530B802059BEF2D6AB5D6443AB3751EFC1324F144939DA42DF281DF65CE828BC1
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0b81e80239486a9be18fd9abdb6340cb68c6e8b6d2d63bcc1cbde1efd6f44b76
                                            • Instruction ID: f1496baa5021bb86ad0e7c9fcf8e0f875b473c462b349a5512306c8de3ca544e
                                            • Opcode Fuzzy Hash: 0b81e80239486a9be18fd9abdb6340cb68c6e8b6d2d63bcc1cbde1efd6f44b76
                                            • Instruction Fuzzy Hash: 5A118E34A102099FDB51EB68E89079EBBB5EB84201F5046A9D904DF258EF31BE098B81
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 63a78e32820496ea5df0fa21a02fafb3e328ac9945292905fb31f161fc953809
                                            • Instruction ID: c540e85fba64cb7e7695dadb5d138e8e41b2da1c9dd1e0bd43758577e5343bf9
                                            • Opcode Fuzzy Hash: 63a78e32820496ea5df0fa21a02fafb3e328ac9945292905fb31f161fc953809
                                            • Instruction Fuzzy Hash: 1511A331E002159FCB16EFB884402DF7BF5EF89224F59057AD949E7341EB79CA828B91
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 20852458fb6bbc20d2988490c4f0c7fe1a1956aec3a12f3ed5ba6243c2052a6a
                                            • Instruction ID: 2e015b87caeb1b9429dd73068517875b4625bb28db93535076cbd08f9bbd7896
                                            • Opcode Fuzzy Hash: 20852458fb6bbc20d2988490c4f0c7fe1a1956aec3a12f3ed5ba6243c2052a6a
                                            • Instruction Fuzzy Hash: C3014431E002159FDF25EFB9845029F7BF5EB88350F14057AD949E7301EB76C9818B91
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c6d2aefcbbeadfa1f26b4d63fe18e07b1996e298b99001cb09b416617aeae210
                                            • Instruction ID: ec087287a8a4b4d4c1c7125bddd96f384eca939685352f08f2d1aa4289abdef5
                                            • Opcode Fuzzy Hash: c6d2aefcbbeadfa1f26b4d63fe18e07b1996e298b99001cb09b416617aeae210
                                            • Instruction Fuzzy Hash: ADF0C439B00208CFD714DB78D598BAD7BB2EF89315F5144A8E9069B3A4DF31AD42CB40
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 48b3b75bef8cb7e2e2d554f55a6d34c8e61808a32fdebd512143c18b6f4ebf0b
                                            • Instruction ID: 103979b37f068bdd6d45ab727910e6fb3a5bd48ef7f4bad31d317c4245d9c608
                                            • Opcode Fuzzy Hash: 48b3b75bef8cb7e2e2d554f55a6d34c8e61808a32fdebd512143c18b6f4ebf0b
                                            • Instruction Fuzzy Hash: 4DF03138910259EFDB45FFA4E99079DBBB5EF40300F6086A8C505DF258EA317E099B82
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2497380955.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5fb0000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $q$$q$$q$$q$$q$$q$$q$$q$$q$$q
                                            • API String ID: 0-1298971921
                                            • Opcode ID: 1e873c310488c56726f193f9dd5ce77466a77223da30803d212497f3b9ab4358
                                            • Instruction ID: 1f7f5420964beb449f68af3c14379ea93f40d111166b2fdec3246e454c73a8d5
                                            • Opcode Fuzzy Hash: 1e873c310488c56726f193f9dd5ce77466a77223da30803d212497f3b9ab4358
                                            • Instruction Fuzzy Hash: DC123E30F00219CFEB24DB66D894BAEB7B3BF89301F248569D4069B254EB799D45CF81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2497380955.0000000005FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05FB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_5fb0000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: XPq$\Oq
                                            • API String ID: 0-3725437444
                                            • Opcode ID: 5959e2de9b1d9677ed695ec509ad8f9db05e23bc0b8198f50c1e4332b96b4c24
                                            • Instruction ID: 47d42d0f4f8a9a798bef955dfaa5bdd81fe4566f5e35a619fe8e96e9b75b5382
                                            • Opcode Fuzzy Hash: 5959e2de9b1d9677ed695ec509ad8f9db05e23bc0b8198f50c1e4332b96b4c24
                                            • Instruction Fuzzy Hash: 15D1E331B50115CFEF14DB6DD890AEEBBA2FB88310F25886AD446DB391CAB9DC05C790
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.2494804396.0000000002C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C40000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_2c40000_231210-01-AgentTesla-2eba02.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \Vmm
                                            • API String ID: 0-738080011
                                            • Opcode ID: b7772a6a75a47f30cc82d16e8aa3ecc206b9f6dfce02795da23c353aad9281ef
                                            • Instruction ID: 39cae330f6c421f0b2f7fb26e0061848981be512c451a46bd171bede0bcb3506
                                            • Opcode Fuzzy Hash: b7772a6a75a47f30cc82d16e8aa3ecc206b9f6dfce02795da23c353aad9281ef
                                            • Instruction Fuzzy Hash: EEB13E70E002198FDF28CFA9D88579EBBF2BF88714F248129E815A7294DF749945CF41