Windows Analysis Report
Quote_220072.exe

Overview

General Information

Sample name: Quote_220072.exe
Analysis ID: 1546663
MD5: ac900546c8bf5b3be3184502d0d2d7ba
SHA1: 6427b2e160082bdb6a5b0213a3de348986f31530
SHA256: 23df64fa762b5942d08dc6bf6f5afc75fc932519a96070af492e237b5483747f
Tags: exeuser-threatcat_ch
Infos:

Detection

AgentTesla
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
AI detected suspicious sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

Name Description Attribution Blogpost URLs Link
Agent Tesla, AgentTesla A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla

AV Detection

barindex
Source: Quote_220072.exe.7384.0.memstrmin Malware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.mbarieservicesltd.com", "Username": "saless@mbarieservicesltd.com", "Password": " *o9H+18Q4%;M "}
Source: Quote_220072.exe ReversingLabs: Detection: 55%
Source: Submited Sample Integrated Neural Analysis Model: Matched 100.0% probability
Source: Quote_220072.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknown HTTPS traffic detected: 172.217.18.14:443 -> 192.168.2.9:49738 version: TLS 1.2
Source: unknown HTTPS traffic detected: 142.250.185.193:443 -> 192.168.2.9:49739 version: TLS 1.2
Source: Quote_220072.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 0_2_004066F7 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, 0_2_004066F7
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 0_2_004065AD FindFirstFileW,FindClose, 0_2_004065AD

Networking

barindex
Source: Network traffic Suricata IDS: 2855245 - Severity 1 - ETPRO MALWARE Agent Tesla Exfil via SMTP : 192.168.2.9:49740 -> 199.79.62.115:587
Source: Network traffic Suricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.9:49740 -> 199.79.62.115:587
Source: Network traffic Suricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.9:49740 -> 199.79.62.115:587
Source: Network traffic Suricata IDS: 2839723 - Severity 1 - ETPRO MALWARE Win32/Agent Tesla SMTP Activity : 192.168.2.9:49740 -> 199.79.62.115:587
Source: Network traffic Suricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.9:49740 -> 199.79.62.115:587
Source: global traffic TCP traffic: 192.168.2.9:49740 -> 199.79.62.115:587
Source: Joe Sandbox View IP Address: 199.79.62.115 199.79.62.115
Source: Joe Sandbox View ASN Name: PUBLIC-DOMAIN-REGISTRYUS PUBLIC-DOMAIN-REGISTRYUS
Source: Joe Sandbox View JA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: Network traffic Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.9:49741
Source: Network traffic Suricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.9:49738 -> 172.217.18.14:443
Source: Network traffic Suricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 20.109.210.53:443 -> 192.168.2.9:49735
Source: global traffic TCP traffic: 192.168.2.9:49740 -> 199.79.62.115:587
Source: global traffic HTTP traffic detected: GET /uc?export=download&id=1C0BaSrGvnMsoqpOj3YSAZc-ONgJtao7R HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /download?id=1C0BaSrGvnMsoqpOj3YSAZc-ONgJtao7R&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknown UDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global traffic HTTP traffic detected: GET /uc?export=download&id=1C0BaSrGvnMsoqpOj3YSAZc-ONgJtao7R HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /download?id=1C0BaSrGvnMsoqpOj3YSAZc-ONgJtao7R&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
Source: global traffic DNS traffic detected: DNS query: drive.google.com
Source: global traffic DNS traffic detected: DNS query: drive.usercontent.google.com
Source: global traffic DNS traffic detected: DNS query: mail.mbarieservicesltd.com
Source: Quote_220072.exe, 00000005.00000002.2585874253.00000000348FA000.00000004.00000800.00020000.00000000.sdmp String found in binary or memory: http://mail.mbarieservicesltd.com
Source: Quote_220072.exe String found in binary or memory: http://nsis.sf.net/NSIS_Error...
Source: Quote_220072.exe, 00000005.00000003.1736979105.00000000043A7000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1737066046.00000000043A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://apis.google.com
Source: Quote_220072.exe, 00000005.00000002.2567555318.0000000004338000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://drive.google.com/
Source: Quote_220072.exe, 00000005.00000002.2567555318.0000000004374000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://drive.google.com/uc?export=download&id=1C0BaSrGvnMsoqpOj3YSAZc-ONgJtao7R
Source: Quote_220072.exe, 00000005.00000003.1746407195.00000000043A7000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1775266109.00000000043E0000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1775200701.000000000439D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://drive.usercontent.google.com/
Source: Quote_220072.exe, 00000005.00000003.1746407195.00000000043A7000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000002.2567555318.000000000439D000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000002.2567555318.000000000438D000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1775284184.00000000043A4000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1736979105.00000000043A7000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1737066046.00000000043A7000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1746407195.00000000043A4000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1775200701.000000000439D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://drive.usercontent.google.com/download?id=1C0BaSrGvnMsoqpOj3YSAZc-ONgJtao7R&export=download
Source: Quote_220072.exe, 00000005.00000003.1746407195.00000000043A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://drive.usercontent.google.com/download?id=1C0BaSrGvnMsoqpOj3YSAZc-ONgJtao7R&export=download%=
Source: Quote_220072.exe, 00000005.00000003.1746407195.00000000043A7000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1775284184.00000000043A4000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1775200701.000000000439D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://drive.usercontent.google.com/download?id=1C0BaSrGvnMsoqpOj3YSAZc-ONgJtao7R&export=download7
Source: Quote_220072.exe, 00000005.00000003.1746407195.00000000043A7000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1775284184.00000000043A4000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1775200701.000000000439D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://drive.usercontent.google.com/download?id=1C0BaSrGvnMsoqpOj3YSAZc-ONgJtao7R&export=downloadQ
Source: Quote_220072.exe, 00000005.00000003.1746407195.00000000043A7000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1775284184.00000000043A4000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1775200701.000000000439D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://drive.usercontent.google.com/download?id=1C0BaSrGvnMsoqpOj3YSAZc-ONgJtao7R&export=downloady
Source: Quote_220072.exe, 00000005.00000003.1746407195.00000000043A7000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000002.2567555318.000000000439D000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1775284184.00000000043A4000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1775200701.000000000439D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://drive.usercontent.google.com/t
Source: Quote_220072.exe, 00000005.00000003.1746407195.00000000043A7000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000002.2567555318.000000000439D000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1775284184.00000000043A4000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1775200701.000000000439D000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://drive.usercontent.google.com/y
Source: Quote_220072.exe, 00000005.00000003.1736979105.00000000043A7000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1737066046.00000000043A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://ssl.gstatic.com
Source: Quote_220072.exe, 00000005.00000003.1736979105.00000000043A7000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1737066046.00000000043A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google-analytics.com;report-uri
Source: Quote_220072.exe, 00000005.00000003.1736979105.00000000043A7000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1737066046.00000000043A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.google.com
Source: Quote_220072.exe, 00000005.00000003.1736979105.00000000043A7000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1737066046.00000000043A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.googletagmanager.com
Source: Quote_220072.exe, 00000005.00000003.1736979105.00000000043A7000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000003.1737066046.00000000043A7000.00000004.00000020.00020000.00000000.sdmp String found in binary or memory: https://www.gstatic.com
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49739
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49738
Source: unknown Network traffic detected: HTTP traffic on port 49738 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49739 -> 443
Source: unknown HTTPS traffic detected: 172.217.18.14:443 -> 192.168.2.9:49738 version: TLS 1.2
Source: unknown HTTPS traffic detected: 142.250.185.193:443 -> 192.168.2.9:49739 version: TLS 1.2
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 0_2_004036DA EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx, 0_2_004036DA
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 0_2_6FF82351 0_2_6FF82351
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_348813B8 5_2_348813B8
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_34884140 5_2_34884140
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_34884D58 5_2_34884D58
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_34884488 5_2_34884488
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_377EDE38 5_2_377EDE38
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_377E45A8 5_2_377E45A8
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_377E8BE8 5_2_377E8BE8
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_377EF210 5_2_377EF210
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_377E4FA0 5_2_377E4FA0
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_377E8330 5_2_377E8330
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_377E7BA8 5_2_377E7BA8
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_37916400 5_2_37916400
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_37919C30 5_2_37919C30
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_37913570 5_2_37913570
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_3791B3B2 5_2_3791B3B2
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_37933608 5_2_37933608
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_379319A0 5_2_379319A0
Source: Quote_220072.exe Static PE information: invalid certificate
Source: Quote_220072.exe, 00000005.00000002.2585542298.00000000346B9000.00000004.00000010.00020000.00000000.sdmp Binary or memory string: OriginalFilenameUNKNOWN_FILET vs Quote_220072.exe
Source: Quote_220072.exe Static PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engine Classification label: mal100.troj.spyw.evad.winEXE@3/12@3/3
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 0_2_004036DA EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx, 0_2_004036DA
Source: C:\Users\user\Desktop\Quote_220072.exe File created: C:\Users\user\overlays Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Mutant created: NULL
Source: C:\Users\user\Desktop\Quote_220072.exe File created: C:\Users\user\AppData\Local\Temp\nsb671F.tmp Jump to behavior
Source: Quote_220072.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Quote_220072.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\Quote_220072.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\Quote_220072.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: Quote_220072.exe ReversingLabs: Detection: 55%
Source: C:\Users\user\Desktop\Quote_220072.exe File read: C:\Users\user\Desktop\Quote_220072.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\Quote_220072.exe "C:\Users\user\Desktop\Quote_220072.exe"
Source: C:\Users\user\Desktop\Quote_220072.exe Process created: C:\Users\user\Desktop\Quote_220072.exe "C:\Users\user\Desktop\Quote_220072.exe"
Source: C:\Users\user\Desktop\Quote_220072.exe Process created: C:\Users\user\Desktop\Quote_220072.exe "C:\Users\user\Desktop\Quote_220072.exe" Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: propsys.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: dwmapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: oleacc.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: ntmarta.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: shfolder.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: riched20.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: usp10.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: msls31.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: textinputframework.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: coreuicomponents.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: coremessaging.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: textshaping.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: wininet.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: iertutil.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: sspicli.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: windows.storage.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: wldp.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: profapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: ondemandconnroutehelper.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: winhttp.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: mswsock.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: iphlpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: winnsi.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: urlmon.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: srvcli.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: netutils.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: dnsapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: rasadhlp.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: fwpuclnt.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: schannel.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: mskeyprotect.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: ntasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: msasn1.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: dpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: cryptsp.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: rsaenh.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: cryptbase.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: gpapi.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: ncrypt.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: ncryptsslp.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: mscoree.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: vcruntime140_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: ucrtbase_clr0400.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: wbemcomn.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: amsi.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: userenv.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: vaultcli.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: wintypes.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: dhcpcsvc6.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Section loaded: dhcpcsvc.dll Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe File written: C:\Users\user\Music\antithetic.ini Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Source: Quote_220072.exe Static file information: File size 1197664 > 1048576
Source: Quote_220072.exe Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 0_2_6FF82351 GlobalFree,GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW, 0_2_6FF82351
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_377E1A28 pushfd ; ret 5_2_377E1A2B
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 5_2_377E19EE pushfd ; ret 5_2_377E19F1
Source: C:\Users\user\Desktop\Quote_220072.exe File created: C:\Users\user\AppData\Local\Temp\nsi6AEA.tmp\System.dll Jump to dropped file
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\Quote_220072.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Source: C:\Users\user\Desktop\Quote_220072.exe API/Special instruction interceptor: Address: 5BF8E40
Source: C:\Users\user\Desktop\Quote_220072.exe API/Special instruction interceptor: Address: 27B8E40
Source: C:\Users\user\Desktop\Quote_220072.exe RDTSC instruction interceptor: First address: 5BA014C second address: 5BA014C instructions: 0x00000000 rdtsc 0x00000002 test ebx, 6315EE0Eh 0x00000008 test bh, bh 0x0000000a cmp ebx, ecx 0x0000000c jc 00007F27F4CC3B9Fh 0x0000000e test dx, ax 0x00000011 inc ebp 0x00000012 inc ebx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\Quote_220072.exe RDTSC instruction interceptor: First address: 276014C second address: 276014C instructions: 0x00000000 rdtsc 0x00000002 test ebx, 6315EE0Eh 0x00000008 test bh, bh 0x0000000a cmp ebx, ecx 0x0000000c jc 00007F27F4C8B41Fh 0x0000000e test dx, ax 0x00000011 inc ebp 0x00000012 inc ebx 0x00000013 rdtsc
Source: C:\Users\user\Desktop\Quote_220072.exe Memory allocated: 34880000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Memory allocated: 348A0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Memory allocated: 368A0000 memory reserve | memory write watch Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Window / User API: threadDelayed 4030 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Dropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsi6AEA.tmp\System.dll Jump to dropped file
Source: C:\Users\user\Desktop\Quote_220072.exe Evaded block: after key decision
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8060 Thread sleep count: 252 > 30 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8060 Thread sleep count: 4030 > 30 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -6456360425798339s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -100000s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -99891s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -99766s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -99641s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -99531s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -99422s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -99313s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -99188s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -99063s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -98953s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -98844s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -98719s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -98610s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -98485s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -98360s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -98235s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -98110s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -97985s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -97860s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe TID: 8064 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Source: C:\Users\user\Desktop\Quote_220072.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\Quote_220072.exe WMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 0_2_004066F7 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose, 0_2_004066F7
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 0_2_004065AD FindFirstFileW,FindClose, 0_2_004065AD
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 100000 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 99891 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 99766 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 99641 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 99531 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 99422 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 99313 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 99188 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 99063 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 98953 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 98844 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 98719 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 98610 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 98485 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 98360 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 98235 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 98110 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 97985 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 97860 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: Quote_220072.exe, 00000005.00000002.2567555318.000000000438D000.00000004.00000020.00020000.00000000.sdmp, Quote_220072.exe, 00000005.00000002.2567555318.0000000004338000.00000004.00000020.00020000.00000000.sdmp Binary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\Quote_220072.exe API call chain: ExitProcess graph end node
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 0_2_6FF82351 GlobalFree,GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW, 0_2_6FF82351
Source: C:\Users\user\Desktop\Quote_220072.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Memory allocated: page read and write | page guard Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Process created: C:\Users\user\Desktop\Quote_220072.exe "C:\Users\user\Desktop\Quote_220072.exe" Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Queries volume information: C:\Users\user\Desktop\Quote_220072.exe VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Queries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Code function: 0_2_004036DA EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx, 0_2_004036DA
Source: C:\Users\user\Desktop\Quote_220072.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information

barindex
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: 00000005.00000002.2585874253.00000000348FA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2585874253.00000000348A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Quote_220072.exe PID: 7888, type: MEMORYSTR
Source: C:\Users\user\Desktop\Quote_220072.exe Key opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe File opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe File opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe File opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe File opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe File opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe File opened: C:\FTP Navigator\Ftplist.txt Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe File opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Jump to behavior
Source: C:\Users\user\Desktop\Quote_220072.exe Key opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities Jump to behavior
Source: Yara match File source: 00000005.00000002.2585874253.00000000348A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Quote_220072.exe PID: 7888, type: MEMORYSTR

Remote Access Functionality

barindex
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: 00000005.00000002.2585874253.00000000348FA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: 00000005.00000002.2585874253.00000000348A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Quote_220072.exe PID: 7888, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs