Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Comprobante.de.pago.pdf.exe

Overview

General Information

Sample name:Comprobante.de.pago.pdf.exe
Analysis ID:1586989
MD5:4975e77aa7db89e438da054870282656
SHA1:01c131d5d3d87470b6c74673f310bf742b0b1cdf
SHA256:16362b718dada80d2e68e3495d78e32fc5bfa05d730ec1a451daf6cff9e6cabe
Tags:exeuser-threatinte1
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Suspicious Double Extension File Execution
Yara detected AgentTesla
AI detected suspicious sample
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Initial sample is a PE file and has a suspicious name
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Comprobante.de.pago.pdf.exe (PID: 7012 cmdline: "C:\Users\user\Desktop\Comprobante.de.pago.pdf.exe" MD5: 4975E77AA7DB89E438DA054870282656)
    • RegAsm.exe (PID: 6228 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.lampadari.gr", "Username": "apamadick@lampadari.gr", "Password": "P8P[uVeJU=vh"}
SourceRuleDescriptionAuthorStrings
00000000.00000003.1720843527.0000000000585000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000003.1720843527.0000000000585000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000003.1721037732.0000000000585000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000003.1721037732.0000000000585000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.1723590669.000000002FDDD000.00000040.00000001.01000000.00000003.sdmpLokiBot_Dropper_Packed_R11_Feb18Auto-generated rule - file scan copy.pdf.r11Florian Roth
          • 0x186c:$s1: C:\Program Files (x86)\Microsoft Visual Studio\VB98\VB6.OLB
          Click to see the 11 entries
          SourceRuleDescriptionAuthorStrings
          0.3.Comprobante.de.pago.pdf.exe.585998.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.3.Comprobante.de.pago.pdf.exe.585998.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              0.3.Comprobante.de.pago.pdf.exe.585998.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.3.Comprobante.de.pago.pdf.exe.585998.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x3442b:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x3449d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x34527:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x345b9:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x34623:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x34695:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x3472b:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x347bb:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.3.Comprobante.de.pago.pdf.exe.585998.1.raw.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                • 0x31611:$s2: GetPrivateProfileString
                • 0x30d33:$s3: get_OSFullName
                • 0x3237e:$s5: remove_Key
                • 0x32522:$s5: remove_Key
                • 0x33475:$s6: FtpWebRequest
                • 0x3440d:$s7: logins
                • 0x3497f:$s7: logins
                • 0x37662:$s7: logins
                • 0x37742:$s7: logins
                • 0x39095:$s7: logins
                • 0x382dc:$s9: 1.85 (Hash, version 2, native byte-order)
                Click to see the 23 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Comprobante.de.pago.pdf.exe", CommandLine: "C:\Users\user\Desktop\Comprobante.de.pago.pdf.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exe, NewProcessName: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exe, OriginalFileName: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\Comprobante.de.pago.pdf.exe", ProcessId: 7012, ProcessName: Comprobante.de.pago.pdf.exe
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Comprobante.de.pago.pdf.exeAvira: detected
                Source: 1.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.lampadari.gr", "Username": "apamadick@lampadari.gr", "Password": "P8P[uVeJU=vh"}
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                Source: Comprobante.de.pago.pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

                Networking

                barindex
                Source: Yara matchFile source: 0.3.Comprobante.de.pago.pdf.exe.585998.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Comprobante.de.pago.pdf.exe.3e40000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.Comprobante.de.pago.pdf.exe.585998.0.raw.unpack, type: UNPACKEDPE
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                Source: unknownDNS query: name: ip-api.com
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: ip-api.com
                Source: Comprobante.de.pago.pdf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                Source: Comprobante.de.pago.pdf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                Source: Comprobante.de.pago.pdf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                Source: Comprobante.de.pago.pdf.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                Source: Comprobante.de.pago.pdf.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                Source: Comprobante.de.pago.pdf.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                Source: Comprobante.de.pago.pdf.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                Source: Comprobante.de.pago.pdf.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                Source: Comprobante.de.pago.pdf.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                Source: RegAsm.exe, 00000001.00000002.2904528958.0000000003321000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2904528958.00000000033FF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2904528958.00000000033E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                Source: Comprobante.de.pago.pdf.exe, 00000000.00000003.1720843527.0000000000585000.00000004.00000020.00020000.00000000.sdmp, Comprobante.de.pago.pdf.exe, 00000000.00000003.1721037732.0000000000585000.00000004.00000020.00020000.00000000.sdmp, Comprobante.de.pago.pdf.exe, 00000000.00000002.1723294768.0000000003E42000.00000040.10000000.00040000.00000000.sdmp, Comprobante.de.pago.pdf.exe, 00000000.00000003.1720964076.0000000003D41000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2904528958.0000000003321000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2902848965.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2904528958.00000000033E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                Source: Comprobante.de.pago.pdf.exeString found in binary or memory: http://ocsp.digicert.com0
                Source: Comprobante.de.pago.pdf.exeString found in binary or memory: http://ocsp.digicert.com0A
                Source: Comprobante.de.pago.pdf.exeString found in binary or memory: http://ocsp.digicert.com0C
                Source: Comprobante.de.pago.pdf.exeString found in binary or memory: http://ocsp.digicert.com0X
                Source: RegAsm.exe, 00000001.00000002.2904528958.0000000003321000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2904528958.00000000033E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: Comprobante.de.pago.pdf.exeString found in binary or memory: http://www.digicert.com/CPS0
                Source: Comprobante.de.pago.pdf.exe, 00000000.00000003.1720843527.0000000000585000.00000004.00000020.00020000.00000000.sdmp, Comprobante.de.pago.pdf.exe, 00000000.00000003.1721037732.0000000000585000.00000004.00000020.00020000.00000000.sdmp, Comprobante.de.pago.pdf.exe, 00000000.00000002.1723294768.0000000003E42000.00000040.10000000.00040000.00000000.sdmp, Comprobante.de.pago.pdf.exe, 00000000.00000003.1720964076.0000000003D41000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2902848965.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                Source: Comprobante.de.pago.pdf.exeString found in binary or memory: https://github.com/mullvad/mullvadvpn-app#readme0

                System Summary

                barindex
                Source: 0.3.Comprobante.de.pago.pdf.exe.585998.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.3.Comprobante.de.pago.pdf.exe.585998.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.3.Comprobante.de.pago.pdf.exe.585998.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.3.Comprobante.de.pago.pdf.exe.585998.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.2.Comprobante.de.pago.pdf.exe.3e40000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.2.Comprobante.de.pago.pdf.exe.3e40000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.3.Comprobante.de.pago.pdf.exe.585998.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.3.Comprobante.de.pago.pdf.exe.585998.0.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.3.Comprobante.de.pago.pdf.exe.585998.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.3.Comprobante.de.pago.pdf.exe.585998.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 00000000.00000002.1723590669.000000002FDDD000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Auto-generated rule - file scan copy.pdf.r11 Author: Florian Roth
                Source: initial sampleStatic PE information: Filename: Comprobante.de.pago.pdf.exe
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_2FFF5D10 __vbaFreeVar,NtSetInformationProcess,0_2_2FFF5D10
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_2FFC54FB NtAllocateVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,0_2_2FFC54FB
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_028C2C8B NtCreateSection,NtMapViewOfSection,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_028C2C8B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004464CA NtAllocateVirtualMemory,1_2_004464CA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0044355F NtDelayExecution,1_2_0044355F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004461D6 NtProtectVirtualMemory,1_2_004461D6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004459BD NtAllocateVirtualMemory,1_2_004459BD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00443296 NtClose,1_2_00443296
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004432B5 NtCreateThreadEx,NtClose,1_2_004432B5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00446368 NtProtectVirtualMemory,1_2_00446368
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00445C4B NtAllocateVirtualMemory,1_2_00445C4B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004465CE NtProtectVirtualMemory,1_2_004465CE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004461E9 NtProtectVirtualMemory,1_2_004461E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00445D96 NtAllocateVirtualMemory,1_2_00445D96
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00443F81 NtCreateThreadEx,NtClose,1_2_00443F81
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_004437BB NtCreateThreadEx,NtClose,1_2_004437BB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0314A6CD1_2_0314A6CD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_03144A801_2_03144A80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_03143E681_2_03143E68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_031441B01_2_031441B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0314DD281_2_0314DD28
                Source: Comprobante.de.pago.pdf.exeStatic PE information: invalid certificate
                Source: Comprobante.de.pago.pdf.exe, 00000000.00000003.1720843527.0000000000585000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename756a5eef-0c1c-4bed-83c6-a963e51853c7.exe4 vs Comprobante.de.pago.pdf.exe
                Source: Comprobante.de.pago.pdf.exe, 00000000.00000003.1721037732.0000000000585000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename756a5eef-0c1c-4bed-83c6-a963e51853c7.exe4 vs Comprobante.de.pago.pdf.exe
                Source: Comprobante.de.pago.pdf.exe, 00000000.00000000.1655314564.000000002FFFD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameacvm7qw909e.exe vs Comprobante.de.pago.pdf.exe
                Source: Comprobante.de.pago.pdf.exe, 00000000.00000002.1723294768.0000000003E7E000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilename756a5eef-0c1c-4bed-83c6-a963e51853c7.exe4 vs Comprobante.de.pago.pdf.exe
                Source: Comprobante.de.pago.pdf.exe, 00000000.00000003.1720964076.0000000003D41000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename756a5eef-0c1c-4bed-83c6-a963e51853c7.exe4 vs Comprobante.de.pago.pdf.exe
                Source: Comprobante.de.pago.pdf.exeBinary or memory string: OriginalFilenameacvm7qw909e.exe vs Comprobante.de.pago.pdf.exe
                Source: Comprobante.de.pago.pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: 0.3.Comprobante.de.pago.pdf.exe.585998.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.3.Comprobante.de.pago.pdf.exe.585998.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.3.Comprobante.de.pago.pdf.exe.585998.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.3.Comprobante.de.pago.pdf.exe.585998.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.2.Comprobante.de.pago.pdf.exe.3e40000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.2.Comprobante.de.pago.pdf.exe.3e40000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.3.Comprobante.de.pago.pdf.exe.585998.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.3.Comprobante.de.pago.pdf.exe.585998.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.3.Comprobante.de.pago.pdf.exe.585998.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.3.Comprobante.de.pago.pdf.exe.585998.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 00000000.00000002.1723590669.000000002FDDD000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: LokiBot_Dropper_Packed_R11_Feb18 date = 2018-02-14, hash1 = 3b248d40fd7acb839cc592def1ed7652734e0e5ef93368be3c36c042883a3029, author = Florian Roth, description = Auto-generated rule - file scan copy.pdf.r11, reference = https://app.any.run/tasks/401df4d9-098b-4fd0-86e0-7a52ce6ddbf5, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                Source: Comprobante.de.pago.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegAsm.exe, 00000001.00000002.2904528958.000000000341D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: unknownProcess created: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exe "C:\Users\user\Desktop\Comprobante.de.pago.pdf.exe"
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeSection loaded: msvbvm60.dllJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeSection loaded: vb6zz.dllJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeSection loaded: vb6de.dllJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeSection loaded: vb6de.dllJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0BE35204-8F91-11CE-9DE3-00AA004BB851}\InprocServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                Source: Comprobante.de.pago.pdf.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: Comprobante.de.pago.pdf.exeStatic file information: File size 2288032 > 1048576
                Source: Comprobante.de.pago.pdf.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x226000
                Source: Comprobante.de.pago.pdf.exeStatic PE information: real checksum: 0x235921 should be: 0x231ce7
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_2FDDCDFB push D4006C00h; iretd 0_2_2FDDCE05
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_00528DF9 push ebp; iretd 0_2_00528DFA
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_00528DA9 push eax; iretd 0_2_00528DAA
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_028C1AEB pushfd ; retf 0_2_028C1AEC
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_028C1A3B push ebx; ret 0_2_028C1A3D
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_028C07A9 push ebx; retf 0_2_028C18A0
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_028C1F0C push es; ret 0_2_028C1F10
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_028C2902 pushfd ; iretd 0_2_028C2908
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0044585B push edx; iretd 1_2_0044585C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00445647 push ds; retf 1_2_00445648
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00445641 push ds; retf 1_2_00445643
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00446305 push ebp; ret 1_2_00446308
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00444FB5 push cs; retf 1_2_00444FCB
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                Source: Comprobante.de.pago.pdf.exe, 00000000.00000003.1720843527.0000000000585000.00000004.00000020.00020000.00000000.sdmp, Comprobante.de.pago.pdf.exe, 00000000.00000003.1721037732.0000000000585000.00000004.00000020.00020000.00000000.sdmp, Comprobante.de.pago.pdf.exe, 00000000.00000002.1723294768.0000000003E42000.00000040.10000000.00040000.00000000.sdmp, Comprobante.de.pago.pdf.exe, 00000000.00000003.1720964076.0000000003D41000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2904528958.0000000003355000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2904528958.00000000033FF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2902848965.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3060000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3320000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3060000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6352Thread sleep count: 169 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6352Thread sleep time: -169000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: RegAsm.exe, 00000001.00000002.2904528958.00000000033FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                Source: RegAsm.exe, 00000001.00000002.2902848965.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: vmware
                Source: RegAsm.exe, 00000001.00000002.2902848965.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                Source: RegAsm.exe, 00000001.00000002.2905844566.00000000065C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior

                Anti Debugging

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_03147068 CheckRemoteDebuggerPresent,1_2_03147068
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_2FFC5AB1 mov eax, dword ptr fs:[00000030h]0_2_2FFC5AB1
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_028C2C8B mov eax, dword ptr fs:[00000030h]0_2_028C2C8B
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_028C6E91 mov eax, dword ptr fs:[00000030h]0_2_028C6E91
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_028C6E35 mov eax, dword ptr fs:[00000030h]0_2_028C6E35
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_028C325C mov eax, dword ptr fs:[00000030h]0_2_028C325C
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_028C6F1C mov eax, dword ptr fs:[00000030h]0_2_028C6F1C
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_028C733E mov eax, dword ptr fs:[00000030h]0_2_028C733E
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_028C7096 mov eax, dword ptr fs:[00000030h]0_2_028C7096
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_028C6CD3 mov eax, dword ptr fs:[00000030h]0_2_028C6CD3
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_028C6D25 mov eax, dword ptr fs:[00000030h]0_2_028C6D25
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeCode function: 0_2_028C453A mov ecx, dword ptr fs:[00000030h]0_2_028C453A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00443296 mov ecx, dword ptr fs:[00000030h]1_2_00443296
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00445C78 mov eax, dword ptr fs:[00000030h]1_2_00445C78
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0044609A mov eax, dword ptr fs:[00000030h]1_2_0044609A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00445DE7 mov eax, dword ptr fs:[00000030h]1_2_00445DE7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00445DF2 mov eax, dword ptr fs:[00000030h]1_2_00445DF2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00445A4A mov eax, dword ptr fs:[00000030h]1_2_00445A4A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00445A2F mov eax, dword ptr fs:[00000030h]1_2_00445A2F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00445A81 mov eax, dword ptr fs:[00000030h]1_2_00445A81
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00445A95 mov eax, dword ptr fs:[00000030h]1_2_00445A95
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00446309 mov ecx, dword ptr fs:[00000030h]1_2_00446309
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00445BED mov eax, dword ptr fs:[00000030h]1_2_00445BED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_00445B91 mov eax, dword ptr fs:[00000030h]1_2_00445B91
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: E2E008Jump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Comprobante.de.pago.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.3.Comprobante.de.pago.pdf.exe.585998.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.Comprobante.de.pago.pdf.exe.585998.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Comprobante.de.pago.pdf.exe.3e40000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.Comprobante.de.pago.pdf.exe.585998.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.Comprobante.de.pago.pdf.exe.585998.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000003.1720843527.0000000000585000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.1721037732.0000000000585000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1723294768.0000000003E42000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.1720964076.0000000003D41000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2902848965.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Comprobante.de.pago.pdf.exe PID: 7012, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6228, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: Yara matchFile source: 0.3.Comprobante.de.pago.pdf.exe.585998.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.Comprobante.de.pago.pdf.exe.585998.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Comprobante.de.pago.pdf.exe.3e40000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.Comprobante.de.pago.pdf.exe.585998.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.Comprobante.de.pago.pdf.exe.585998.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000003.1720843527.0000000000585000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.1721037732.0000000000585000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1723294768.0000000003E42000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.1720964076.0000000003D41000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2902848965.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2904528958.0000000003355000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Comprobante.de.pago.pdf.exe PID: 7012, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6228, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.3.Comprobante.de.pago.pdf.exe.585998.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.Comprobante.de.pago.pdf.exe.585998.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Comprobante.de.pago.pdf.exe.3e40000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.Comprobante.de.pago.pdf.exe.585998.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.Comprobante.de.pago.pdf.exe.585998.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000003.1720843527.0000000000585000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.1721037732.0000000000585000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1723294768.0000000003E42000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.1720964076.0000000003D41000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2902848965.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Comprobante.de.pago.pdf.exe PID: 7012, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6228, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
                Windows Management Instrumentation
                1
                DLL Side-Loading
                211
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                531
                Security Software Discovery
                Remote Services1
                Email Collection
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                25
                Virtualization/Sandbox Evasion
                LSASS Memory25
                Virtualization/Sandbox Evasion
                Remote Desktop Protocol1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                Disable or Modify Tools
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin Shares1
                Data from Local System
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook211
                Process Injection
                NTDS1
                System Network Configuration Discovery
                Distributed Component Object ModelInput Capture2
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Obfuscated Files or Information
                LSA Secrets1
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain Credentials34
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Comprobante.de.pago.pdf.exe100%AviraTR/Dropper.Gen
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                ip-api.com
                208.95.112.1
                truefalse
                  high
                  NameMaliciousAntivirus DetectionReputation
                  http://ip-api.com/line/?fields=hostingfalse
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://account.dyn.com/Comprobante.de.pago.pdf.exe, 00000000.00000003.1720843527.0000000000585000.00000004.00000020.00020000.00000000.sdmp, Comprobante.de.pago.pdf.exe, 00000000.00000003.1721037732.0000000000585000.00000004.00000020.00020000.00000000.sdmp, Comprobante.de.pago.pdf.exe, 00000000.00000002.1723294768.0000000003E42000.00000040.10000000.00040000.00000000.sdmp, Comprobante.de.pago.pdf.exe, 00000000.00000003.1720964076.0000000003D41000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2902848965.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                      high
                      https://github.com/mullvad/mullvadvpn-app#readme0Comprobante.de.pago.pdf.exefalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000001.00000002.2904528958.0000000003321000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2904528958.00000000033E4000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://ip-api.comRegAsm.exe, 00000001.00000002.2904528958.0000000003321000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2904528958.00000000033FF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.2904528958.00000000033E4000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            208.95.112.1
                            ip-api.comUnited States
                            53334TUT-ASUSfalse
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1586989
                            Start date and time:2025-01-09 20:43:07 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 12s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:6
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:Comprobante.de.pago.pdf.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 80%
                            • Number of executed functions: 15
                            • Number of non-executed functions: 16
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                            • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.45
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • VT rate limit hit for: Comprobante.de.pago.pdf.exe
                            TimeTypeDescription
                            14:44:46API Interceptor139x Sleep call for process: RegAsm.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            208.95.112.1p.exeGet hashmaliciousUnknownBrowse
                            • ip-api.com/csv/?fields=query
                            rNuevaorden_pdf.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            I334hDwRjj.exeGet hashmaliciousBlank Grabber, NjratBrowse
                            • ip-api.com/json/?fields=225545
                            startup_str_466.batGet hashmaliciousXWormBrowse
                            • ip-api.com/line/?fields=hosting
                            7dtpow.ps1Get hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            x.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            TR98760H.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            47SXvEQ.exeGet hashmaliciousBlank Grabber, XmrigBrowse
                            • ip-api.com/json/?fields=225545
                            test.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                            • ip-api.com/json/
                            HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                            • ip-api.com/line/?fields=hosting
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            ip-api.comp.exeGet hashmaliciousUnknownBrowse
                            • 208.95.112.1
                            rNuevaorden_pdf.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            I334hDwRjj.exeGet hashmaliciousBlank Grabber, NjratBrowse
                            • 208.95.112.1
                            startup_str_466.batGet hashmaliciousXWormBrowse
                            • 208.95.112.1
                            7dtpow.ps1Get hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            x.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            TR98760H.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            47SXvEQ.exeGet hashmaliciousBlank Grabber, XmrigBrowse
                            • 208.95.112.1
                            test.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                            • 208.95.112.1
                            HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                            • 208.95.112.1
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            TUT-ASUSp.exeGet hashmaliciousUnknownBrowse
                            • 208.95.112.1
                            rNuevaorden_pdf.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            I334hDwRjj.exeGet hashmaliciousBlank Grabber, NjratBrowse
                            • 208.95.112.1
                            startup_str_466.batGet hashmaliciousXWormBrowse
                            • 208.95.112.1
                            7dtpow.ps1Get hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            x.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            TR98760H.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            47SXvEQ.exeGet hashmaliciousBlank Grabber, XmrigBrowse
                            • 208.95.112.1
                            test.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                            • 208.95.112.1
                            HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                            • 208.95.112.1
                            No context
                            No context
                            Process:C:\Users\user\Desktop\Comprobante.de.pago.pdf.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):46
                            Entropy (8bit):1.0424600748477153
                            Encrypted:false
                            SSDEEP:3:/lbq:4
                            MD5:8CB7B7F28464C3FCBAE8A10C46204572
                            SHA1:767FE80969EC2E67F54CC1B6D383C76E7859E2DE
                            SHA-256:ED5E3DCEB0A1D68803745084985051C1ED41E11AC611DF8600B1A471F3752E96
                            SHA-512:9BA84225FDB6C0FD69AD99B69824EC5B8D2B8FD3BB4610576DB4AD79ADF381F7F82C4C9522EC89F7171907577FAF1B4E70B82364F516CF8BBFED99D2ADEA43AF
                            Malicious:false
                            Reputation:high, very likely benign file
                            Preview:........................................user.
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):7.175604599526794
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.15%
                            • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:Comprobante.de.pago.pdf.exe
                            File size:2'288'032 bytes
                            MD5:4975e77aa7db89e438da054870282656
                            SHA1:01c131d5d3d87470b6c74673f310bf742b0b1cdf
                            SHA256:16362b718dada80d2e68e3495d78e32fc5bfa05d730ec1a451daf6cff9e6cabe
                            SHA512:93f214fb28ebaa4ac45141401e6d29f401f062087fa81eb0a494527e3ae0d66ea0daff6022f89b6f8881e295279f2c5c2fb84a322e3108f62f2aac3ae59d8ff6
                            SSDEEP:49152:HX3ASbdYAm4zEbdYAm4zWbdYAm4z23Ag3AWbdYAm4zSbdYAm4zO3AGyhdWn:HnA4drWdr0drkASA0dr4dr8AGi
                            TLSH:FCB5CF0322208F6FED8ADF3673BA80E443153C5907155A42329F7720EB779BE5D29A5B
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................Rich............PE..L......g.................`"..P......4........p"..../.......
                            Icon Hash:a3a3939a92b3929a
                            Entrypoint:0x2fdd1234
                            Entrypoint Section:.text
                            Digitally signed:true
                            Imagebase:0x2fdd0000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                            DLL Characteristics:
                            Time Stamp:0x6780170B [Thu Jan 9 18:35:55 2025 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:42a4e0f64241075ea237a4cf00d0db9f
                            Signature Valid:false
                            Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                            Signature Validation Error:The digital signature of the object did not verify
                            Error Number:-2146869232
                            Not Before, Not After
                            • 14/03/2024 00:00:00 06/02/2027 23:59:59
                            Subject Chain
                            • CN=Mullvad VPN AB, O=Mullvad VPN AB, L=G\xf6teborg, C=SE, SERIALNUMBER=559238-4001, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=SE
                            Version:3
                            Thumbprint MD5:7068F855B513C1F69538E13DF0A7870D
                            Thumbprint SHA-1:1F5E906F4E2DBE2A3C3226A6B0638E9327F76135
                            Thumbprint SHA-256:4136B97CF51C1779F94FF626978743FF874E0EABB3AFB5CB00CB9E6DBB5440E8
                            Serial:078050BBC100F2FFAF0FE03B15FE221A
                            Instruction
                            push 2FDDA54Ch
                            call 00007FD2947FB345h
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            xor byte ptr [eax], al
                            add byte ptr [eax], al
                            inc eax
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add dh, al
                            push ebx
                            jns 00007FD2947FB375h
                            mov ecx, B04DD8DFh
                            mov byte ptr [edx], ah
                            sbb dword ptr [edx-17h], edx
                            and byte ptr [ebx], dh
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add dword ptr [eax], eax
                            add byte ptr [eax], al
                            sub eax, 30303043h
                            sub eax, 61726543h
                            pop edi
                            push esi
                            popad
                            jno 00007FD2947FB3B7h
                            popad
                            add byte ptr [esi], dh
                            jnl 00007FD2947FB375h
                            xor ch, byte ptr [esi]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            dec esp
                            xor dword ptr [eax], eax
                            add al, al
                            fsub qword ptr [edi+37h]
                            pop ebp
                            fstp dword ptr [edx-019657BCh]
                            int 97h
                            sbb byte ptr [edi-3D100426h], ch
                            mov edx, ecx
                            jno 00007FD2947FB320h
                            inc esp
                            mov ch, 59h
                            xor bl, byte ptr [edx+2Fh]
                            mov dword ptr [4F3A5001h], eax
                            lodsd
                            xor ebx, dword ptr [ecx-48EE309Ah]
                            or al, 00h
                            stosb
                            add byte ptr [eax-2Dh], ah
                            xchg eax, ebx
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            xor dl, byte ptr [ecx+00420000h]
                            add byte ptr [eax], al
                            add byte ptr [726F4600h], al
                            insd
                            xor dword ptr [eax], eax
                            or eax, 46000501h
                            outsd
                            jc 00007FD2947FB3BFh
                            xor dword ptr [eax], eax
                            sbb dword ptr [ecx], eax
                            add byte ptr [edx+00h], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x2274080x3c.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x22d0000x2894.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x22c0000x29a0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x2270000x180.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x2257440x22600020f265c0c4f333648589b1b1f8f2d4c7unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x2270000xb300x1000e8eeb57f1a4bf4d49c950ed1deafcf11False0.2734375data3.86650564830794IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x2280000x4bac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x22d0000x28940x3000cf4509ef44e700a268c235d9994746cfFalse0.19539388020833334data4.245983192689374IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x22d0e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.21047717842323652
                            RT_GROUP_ICON0x22f6900x14data1.15
                            RT_VERSION0x22f6a40x1f0MS Windows COFF PowerPC object fileGermanGermany0.49798387096774194
                            DLLImport
                            KERNEL32.DLLGetProcAddress, GetModuleHandleW
                            MSVBVM60.DLL__vbaVarSub, _CIcos, _adj_fptan, __vbaVarMove, __vbaVarVargNofree, __vbaFreeVar, __vbaAryMove, __vbaStrVarMove, __vbaLenBstr, __vbaFreeVarList, _adj_fdiv_m64, __vbaNextEachVar, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaBoolErrVar, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenVar, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaRefVarAry, __vbaBoolVarNull, _CIsin, __vbaVargVarMove, __vbaVarZero, __vbaVarCmpGt, __vbaChkstk, EVENT_SINK_AddRef, __vbaVarTstEq, DllFunctionCall, __vbaVarOr, __vbaRedimPreserve, _adj_fpatan, __vbaRedim, EVENT_SINK_Release, __vbaNew, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaInStrVar, __vbaStrVarVal, __vbaUbound, __vbaVarCat, _CIlog, __vbaVar2Vec, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaI4Var, __vbaAryLock, __vbaVarAdd, __vbaVarDup, __vbaStrToAnsi, __vbaVarCopy, __vbaVarLateMemCallLd, _CIatan, __vbaStrMove, __vbaCastObj, __vbaStrVarCopy, __vbaForEachVar, _allmul, _CItan, __vbaAryUnlock, _CIexp, __vbaFreeObj, __vbaFreeStr
                            Language of compilation systemCountry where language is spokenMap
                            GermanGermany
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 9, 2025 20:44:04.652734995 CET4973180192.168.2.4208.95.112.1
                            Jan 9, 2025 20:44:04.657840014 CET8049731208.95.112.1192.168.2.4
                            Jan 9, 2025 20:44:04.657927990 CET4973180192.168.2.4208.95.112.1
                            Jan 9, 2025 20:44:04.658655882 CET4973180192.168.2.4208.95.112.1
                            Jan 9, 2025 20:44:04.663541079 CET8049731208.95.112.1192.168.2.4
                            Jan 9, 2025 20:44:05.463661909 CET8049731208.95.112.1192.168.2.4
                            Jan 9, 2025 20:44:05.516781092 CET4973180192.168.2.4208.95.112.1
                            Jan 9, 2025 20:45:30.556902885 CET8049731208.95.112.1192.168.2.4
                            Jan 9, 2025 20:45:30.557085037 CET4973180192.168.2.4208.95.112.1
                            Jan 9, 2025 20:45:45.488734961 CET4973180192.168.2.4208.95.112.1
                            Jan 9, 2025 20:45:45.494040012 CET8049731208.95.112.1192.168.2.4
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 9, 2025 20:44:04.640311956 CET6272553192.168.2.41.1.1.1
                            Jan 9, 2025 20:44:04.647618055 CET53627251.1.1.1192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jan 9, 2025 20:44:04.640311956 CET192.168.2.41.1.1.10x5b25Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jan 9, 2025 20:44:04.647618055 CET1.1.1.1192.168.2.40x5b25No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                            • ip-api.com
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.449731208.95.112.1806228C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            TimestampBytes transferredDirectionData
                            Jan 9, 2025 20:44:04.658655882 CET80OUTGET /line/?fields=hosting HTTP/1.1
                            Host: ip-api.com
                            Connection: Keep-Alive
                            Jan 9, 2025 20:44:05.463661909 CET175INHTTP/1.1 200 OK
                            Date: Thu, 09 Jan 2025 19:44:04 GMT
                            Content-Type: text/plain; charset=utf-8
                            Content-Length: 6
                            Access-Control-Allow-Origin: *
                            X-Ttl: 60
                            X-Rl: 44
                            Data Raw: 66 61 6c 73 65 0a
                            Data Ascii: false


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:14:43:56
                            Start date:09/01/2025
                            Path:C:\Users\user\Desktop\Comprobante.de.pago.pdf.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\Comprobante.de.pago.pdf.exe"
                            Imagebase:0x2fdd0000
                            File size:2'288'032 bytes
                            MD5 hash:4975E77AA7DB89E438DA054870282656
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1720843527.0000000000585000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.1720843527.0000000000585000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1721037732.0000000000585000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.1721037732.0000000000585000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: LokiBot_Dropper_Packed_R11_Feb18, Description: Auto-generated rule - file scan copy.pdf.r11, Source: 00000000.00000002.1723590669.000000002FDDD000.00000040.00000001.01000000.00000003.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1723294768.0000000003E42000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1723294768.0000000003E42000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1720964076.0000000003D41000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.1720964076.0000000003D41000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:1
                            Start time:14:44:03
                            Start date:09/01/2025
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                            Imagebase:0xdc0000
                            File size:65'440 bytes
                            MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2902848965.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2902848965.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2904528958.0000000003355000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:22.2%
                              Dynamic/Decrypted Code Coverage:21.1%
                              Signature Coverage:23.2%
                              Total number of Nodes:190
                              Total number of Limit Nodes:13
                              execution_graph 1153 2fddae99 1154 2fff5720 1153->1154 1157 2fddaf09 1154->1157 1155 2fff5769 1158 2fff57a0 1157->1158 1166 2fff5c90 1158->1166 1162 2fff57e9 1212 2fff5d10 1162->1212 1165 2fff5808 1165->1155 1216 2ffc54fb 1166->1216 1169 2ffef670 9 API calls 1227 2fff3540 __vbaVarDup #653 __vbaI4Var __vbaFreeVar 1169->1227 1171 2ffef775 7 API calls 1172 2fff3540 10 API calls 1171->1172 1173 2ffef7ee 45 API calls 1172->1173 1176 2ffef9ec 1173->1176 1174 2ffefa04 __vbaAryLock #644 __vbaAryUnlock 1174->1176 1175 2ffefa65 __vbaObjSetAddref #644 __vbaFreeObj #644 1232 2ffc5bcb 1175->1232 1176->1174 1176->1175 1178 2ffefaab __vbaAryLock #644 __vbaAryUnlock #644 1233 2ffc5bae 1178->1233 1180 2ffefb01 __vbaRedim #644 1234 2ffc5bae 1180->1234 1182 2ffefb4f #644 1235 2ffc5bae 1182->1235 1184 2ffefb7c __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 1185 2ffefbeb __vbaHresultCheckObj 1184->1185 1186 2ffefc02 __vbaAryUnlock __vbaFreeStr #644 1184->1186 1185->1186 1189 2ffefc37 1186->1189 1187 2ffefc4f __vbaAryLock #644 __vbaAryUnlock 1187->1189 1188 2ffefca6 #644 1236 2ffc5bae 1188->1236 1189->1187 1189->1188 1191 2ffefccc #644 1237 2ffc5bae 1191->1237 1193 2ffefcf2 #644 1238 2ffc5bae 1193->1238 1195 2ffefd18 #644 1239 2ffc5bae 1195->1239 1197 2ffefd3e #644 1240 2ffc5bae 1197->1240 1199 2ffefd64 VirtualProtect 1200 2ffefdaf __vbaHresultCheckObj 1199->1200 1201 2ffefdc6 1199->1201 1200->1201 1202 2ffefde2 __vbaAryLock #644 __vbaAryUnlock 1201->1202 1203 2ffefe33 #644 1201->1203 1202->1201 1241 2ffc5bae 1203->1241 1205 2ffefe4e #644 1242 2ffc5bae 1205->1242 1207 2ffefe63 #644 1208 2ffefe7f 1207->1208 1243 2fff0130 1208->1243 1210 2ffefe88 __vbaFreeVar 1211 2ffefeff __vbaAryDestruct 1210->1211 1211->1162 1254 2fdde144 1212->1254 1214 2fff5d56 NtSetInformationProcess 1215 2fff57f2 __vbaFreeVar 1214->1215 1215->1165 1217 2ffc551d 1216->1217 1225 2ffc5ab1 GetPEB 1217->1225 1219 2ffc5527 1220 2ffc557c NtAllocateVirtualMemory 1219->1220 1221 2ffc559f NtProtectVirtualMemory 1219->1221 1220->1221 1222 2ffc559a __vbaFreeVar 1220->1222 1221->1222 1224 2ffc55ca 1221->1224 1222->1169 1223 2ffc5663 NtProtectVirtualMemory 1223->1222 1224->1223 1226 2ffc5ac3 1225->1226 1226->1219 1228 2fff35c0 1227->1228 1229 2fff35c8 #632 __vbaVarCat __vbaStrVarMove __vbaStrMove __vbaFreeVarList 1228->1229 1230 2fff3631 __vbaFreeVar 1228->1230 1229->1228 1230->1171 1232->1178 1233->1180 1234->1182 1235->1184 1236->1191 1237->1193 1238->1195 1239->1197 1240->1199 1241->1205 1242->1207 1251 2fff0850 1243->1251 1245 2fff016b #644 #644 1252 2ffc5bae 1245->1252 1247 2fff019b #644 1253 2ffc5bcb 1247->1253 1249 2fff01b8 #644 1250 2fff01d7 1249->1250 1250->1210 1251->1245 1252->1247 1253->1249 1255 2fdde14d 1254->1255 1256 28c2c8b 1257 28c2c9c 1256->1257 1275 28c325c GetPEB 1257->1275 1259 28c2ccb 1260 28c3150 1259->1260 1261 28c325c GetPEB 1259->1261 1262 28c2ce6 1261->1262 1262->1260 1263 28c2e52 NtCreateSection 1262->1263 1263->1260 1264 28c2e89 NtMapViewOfSection 1263->1264 1264->1260 1265 28c2eb1 1264->1265 1266 28c3014 GetPEB 1265->1266 1269 28c2f4f CreateProcessW 1265->1269 1266->1269 1268 28c305a NtGetContextThread 1268->1269 1270 28c307b NtReadVirtualMemory 1268->1270 1269->1260 1269->1268 1270->1269 1271 28c30a1 NtWriteVirtualMemory 1270->1271 1271->1269 1272 28c30c7 NtUnmapViewOfSection NtMapViewOfSection 1271->1272 1272->1269 1273 28c30fb NtSetContextThread 1272->1273 1273->1269 1274 28c312c NtResumeThread 1273->1274 1274->1260 1274->1269 1276 28c3271 1275->1276 1276->1259 1391 28c6d25 GetPEB 1278 2fdda796 1279 2fff3fe0 __vbaVarVargNofree __vbaVarCopy __vbaVarTstEq 1278->1279 1281 2fff417b __vbaVarTstEq 1279->1281 1282 2fff40d8 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat 1279->1282 1284 2fff41f3 __vbaVarTstEq 1281->1284 1285 2fff41a0 1281->1285 1283 2ffef3f0 1282->1283 1286 2fff4147 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1283->1286 1287 2fff421c 9 API calls 1284->1287 1288 2fff42e5 __vbaVarTstEq 1284->1288 1290 2fff41de __vbaVargVarMove 1285->1290 1289 2fff440c __vbaVarVargNofree __vbaVarCopy __vbaVarTstEq 1286->1289 1291 2ffef3f0 1287->1291 1292 2fff430e 13 API calls 1288->1292 1293 2fff43fa 1288->1293 1294 2fff4460 __vbaVarTstEq 1289->1294 1317 2fff4456 1289->1317 1290->1293 1295 2fff42a9 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1291->1295 1296 2ffef3f0 1292->1296 1293->1289 1298 2fff45a8 __vbaVarTstEq 1294->1298 1299 2fff4491 19 API calls 1294->1299 1295->1289 1297 2fff43b9 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1296->1297 1297->1289 1301 2fff479b __vbaVarTstEq 1298->1301 1302 2fff45d9 37 API calls 1298->1302 1300 2ffef3f0 1299->1300 1304 2fff455d __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1300->1304 1306 2fff47d2 __vbaVarTstEq 1301->1306 1301->1317 1305 2ffef3f0 1302->1305 1303 2fff561e __vbaVargVarMove 1309 2fff5629 __vbaFreeVarList 1303->1309 1304->1309 1310 2fff472c __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1305->1310 1307 2fff491a __vbaVarTstEq 1306->1307 1308 2fff4803 19 API calls 1306->1308 1312 2fff494b 7 API calls 1307->1312 1313 2fff49f0 __vbaVarTstEq 1307->1313 1311 2ffef3f0 1308->1311 1310->1309 1315 2fff48cf __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1311->1315 1316 2ffef3f0 1312->1316 1313->1317 1318 2fff4a27 __vbaVarTstEq 1313->1318 1315->1309 1319 2fff49bd __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1316->1319 1317->1303 1318->1317 1320 2fff4a5e __vbaVarTstEq 1318->1320 1319->1309 1320->1317 1321 2fff4a95 __vbaVarTstEq 1320->1321 1322 2fff4bdd __vbaVarTstEq 1321->1322 1323 2fff4ac6 19 API calls 1321->1323 1324 2fff4c0e 21 API calls 1322->1324 1325 2fff4d38 __vbaVarTstEq 1322->1325 1326 2ffef3f0 1323->1326 1328 2ffef3f0 1324->1328 1329 2fff4d69 43 API calls 1325->1329 1330 2fff4f64 __vbaVarTstEq 1325->1330 1327 2fff4b92 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1326->1327 1327->1309 1331 2fff4ce9 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1328->1331 1332 2ffef3f0 1329->1332 1333 2fff517d __vbaVarTstEq 1330->1333 1334 2fff4f95 41 API calls 1330->1334 1331->1309 1335 2fff4ee9 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1332->1335 1337 2fff53cf __vbaVarTstEq 1333->1337 1338 2fff51ae 47 API calls 1333->1338 1336 2ffef3f0 1334->1336 1335->1309 1341 2fff5106 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1336->1341 1339 2fff54cb __vbaVarTstEq 1337->1339 1340 2fff5400 11 API calls 1337->1340 1342 2ffef3f0 1338->1342 1339->1317 1345 2fff5505 __vbaVarTstEq 1339->1345 1344 2ffef3f0 1340->1344 1341->1309 1343 2fff534c __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1342->1343 1343->1309 1346 2fff5490 __vbaVargVarMove __vbaFreeStrList __vbaFreeVar 1344->1346 1345->1317 1347 2fff5534 __vbaVarTstEq 1345->1347 1346->1309 1347->1317 1348 2fff5563 __vbaVarTstEq 1347->1348 1348->1317 1349 2fff558f __vbaVarTstEq 1348->1349 1349->1317 1350 2fff55bb __vbaVarTstEq 1349->1350 1350->1309 1350->1317 1376 2fdda771 1377 2fff3c20 19 API calls 1376->1377 1379 2fff3540 10 API calls 1377->1379 1380 2fff3d42 __vbaStrMove __vbaFreeStrList __vbaFreeVar 1379->1380 1381 2fff3dd0 1380->1381 1362 28c4803 1367 28c6cd3 GetPEB 1362->1367 1368 28c6cb5 1367->1368 1368->1367 1389 28c6f1c GetPEB 1390 28c6f2e 1389->1390 1382 28c4a5f 1383 28c51bf 1382->1383 1388 28c733e GetPEB 1383->1388 1357 28c58fa 1358 28c5903 1357->1358 1360 28c7096 GetPEB 1357->1360 1361 28c7289 1360->1361 1361->1361 1392 28c453a GetPEB 1393 28c4554 1392->1393 1395 28c5903 1392->1395 1393->1395 1396 28c4559 1393->1396 1397 28c4a62 1396->1397 1402 28c733e GetPEB 1397->1402

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 61 28c2c8b-28c2cd1 call 28c3159 call 28c325c 66 28c2cd7-28c2ced call 28c325c 61->66 67 28c3150-28c3156 61->67 66->67 70 28c2cf3-28c2de0 call 28c31ad * 12 66->70 70->67 95 28c2de6-28c2de9 70->95 95->67 96 28c2def-28c2df2 95->96 96->67 97 28c2df8-28c2dfb 96->97 97->67 98 28c2e01-28c2e04 97->98 98->67 99 28c2e0a-28c2e0d 98->99 99->67 100 28c2e13-28c2e16 99->100 100->67 101 28c2e1c-28c2e1f 100->101 101->67 102 28c2e25-28c2e28 101->102 102->67 103 28c2e2e-28c2e31 102->103 103->67 104 28c2e37-28c2e39 103->104 104->67 105 28c2e3f-28c2e4d 104->105 106 28c2e4f 105->106 107 28c2e52-28c2e83 NtCreateSection 105->107 106->107 107->67 108 28c2e89-28c2eab NtMapViewOfSection 107->108 108->67 109 28c2eb1-28c2ee7 call 28c323d 108->109 112 28c2f1f-28c2f49 call 28c329a call 28c323d 109->112 113 28c2ee9-28c2eef 109->113 124 28c2f4f-28c2fc6 112->124 125 28c3014-28c3020 GetPEB 112->125 114 28c2ef4-28c2ef8 113->114 117 28c2efa-28c2f0d call 28c323d 114->117 118 28c2f10-28c2f1d 114->118 117->118 118->112 121 28c2ef1 118->121 121->114 129 28c2fc8-28c2fd8 124->129 126 28c3023-28c302a 125->126 128 28c3037-28c3054 CreateProcessW 126->128 128->67 130 28c305a-28c3075 NtGetContextThread 128->130 129->129 131 28c2fda-28c2fdd 129->131 132 28c313c-28c313f 130->132 133 28c307b-28c309b NtReadVirtualMemory 130->133 134 28c2feb-28c2fef 131->134 136 28c3148-28c314b 132->136 137 28c3141-28c3142 132->137 133->132 135 28c30a1-28c30c5 NtWriteVirtualMemory 133->135 138 28c2fdf-28c2fea 134->138 139 28c2ff1 134->139 135->132 140 28c30c7-28c30f9 NtUnmapViewOfSection NtMapViewOfSection 135->140 136->128 137->136 138->134 141 28c2ffe-28c3003 139->141 142 28c3139 140->142 143 28c30fb-28c312a NtSetContextThread 140->143 144 28c3005-28c3012 141->144 145 28c2ff3-28c2ffd 141->145 142->132 143->142 146 28c312c-28c3137 NtResumeThread 143->146 144->126 145->141 146->67 146->142
                              APIs
                              • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 028C2E77
                              • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 028C2EA4
                              • CreateProcessW.KERNELBASE(?,?,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 028C304F
                              • NtGetContextThread.NTDLL(?,?), ref: 028C306E
                              • NtReadVirtualMemory.NTDLL(?,?,?,000001D8,?), ref: 028C3094
                              • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,?), ref: 028C30BE
                              • NtUnmapViewOfSection.NTDLL(?,?), ref: 028C30D9
                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 028C30F2
                              • NtSetContextThread.NTDLL(?,00010003), ref: 028C3123
                              • NtResumeThread.NTDLL(?,00000000), ref: 028C3130
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723201366.00000000028C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_28c0000_Comprobante.jbxd
                              Similarity
                              • API ID: Section$ThreadView$ContextCreateMemoryVirtual$ProcessReadResumeUnmapWrite
                              • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                              • API String ID: 1951729442-1087957892
                              • Opcode ID: bdfd8c2c08da80d8aef1ac999a3557cfaab083761e6134d184dbc6d082490619
                              • Instruction ID: 311f9232dcf37a0bb427ba09d06b11f38b5ad22bf6fb6ba71d44a1331b819676
                              • Opcode Fuzzy Hash: bdfd8c2c08da80d8aef1ac999a3557cfaab083761e6134d184dbc6d082490619
                              • Instruction Fuzzy Hash: F7E1E4BAD00259AFDF11DFA4CC80AEDBBB9AF04304F2484AAF519E7201D7349A56CF55

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 147 2ffc54fb-2ffc557a call 2ffc57ee call 2ffc5ab1 call 2ffc5810 call 2ffc5a52 call 2ffc5810 call 2ffc5a52 call 2ffc5810 call 2ffc5a52 164 2ffc557c-2ffc5598 NtAllocateVirtualMemory 147->164 165 2ffc559f-2ffc55c3 NtProtectVirtualMemory 147->165 164->165 166 2ffc559a 164->166 167 2ffc55ca-2ffc55cf 165->167 168 2ffc55c5 165->168 169 2ffc56c2-2ffc56c7 166->169 170 2ffc55d2-2ffc55d5 167->170 168->169 171 2ffc55db-2ffc55f4 call 2ffc40f6 170->171 172 2ffc5663-2ffc56bc NtProtectVirtualMemory 170->172 175 2ffc55fb-2ffc5606 171->175 176 2ffc55f6-2ffc55f9 171->176 172->169 178 2ffc565e 175->178 176->175 177 2ffc5608-2ffc560b 176->177 179 2ffc560d-2ffc5621 177->179 180 2ffc5623-2ffc5626 177->180 178->170 179->178 181 2ffc5628-2ffc562b 180->181 182 2ffc5644-2ffc5647 180->182 181->182 183 2ffc562d-2ffc5642 181->183 182->178 184 2ffc5649-2ffc564c 182->184 183->178 184->178 185 2ffc564e-2ffc5651 184->185 185->178 186 2ffc5653-2ffc565b 185->186 186->178
                              APIs
                              • NtAllocateVirtualMemory.NTDLL(000000FF,00000100,00000000,00000100,00003000,00000040,?,NtQueryInformationProcess,2FFC425F,?,NtQueryInformationProcess,2FFC4279,?,NtQueryInformationProcess,2FFC4248,NtQueryInformationProcess), ref: 2FFC5592
                              • NtProtectVirtualMemory.NTDLL(000000FF,?,00000005,00000040,00000000,?,NtQueryInformationProcess,2FFC425F,?,NtQueryInformationProcess,2FFC4279,?,NtQueryInformationProcess,2FFC4248,NtQueryInformationProcess,2FFC42EA), ref: 2FFC55BD
                              • NtProtectVirtualMemory.NTDLL(000000FF,?,00000005,00000000,00000000,?,NtQueryInformationProcess,2FFC425F,?,NtQueryInformationProcess,2FFC4279,?,NtQueryInformationProcess,2FFC4248,NtQueryInformationProcess,2FFC42EA), ref: 2FFC56B9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723644226.000000002FDE6000.00000020.00000001.01000000.00000003.sdmp, Offset: 2FDD0000, based on PE: true
                              • Associated: 00000000.00000002.1723484498.000000002FDD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723539110.000000002FDD1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723590669.000000002FDDD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723644226.000000002FDDF000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723928370.000000002FFF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFF8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1724050644.000000002FFFD000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2fdd0000_Comprobante.jbxd
                              Yara matches
                              Similarity
                              • API ID: MemoryVirtual$Protect$Allocate
                              • String ID: NtQueryInformationProcess
                              • API String ID: 955180148-2781105232
                              • Opcode ID: d7a76f36304703e7b6a1fb1005654a13bcfeb6461ac797474d99e47ac478e6c0
                              • Instruction ID: 71fd680668b43d5598718634016c37ffc1a962c4dcde14fe7e02fb52da9040d4
                              • Opcode Fuzzy Hash: d7a76f36304703e7b6a1fb1005654a13bcfeb6461ac797474d99e47ac478e6c0
                              • Instruction Fuzzy Hash: A1518E7190422BAFDB00CBA9C880E9EBBB7EF84320F984755D211A63E1D774A644DB65

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 187 2fff5d10-2fff5d6d call 2fdde144 NtSetInformationProcess
                              APIs
                              • NtSetInformationProcess.NTDLL ref: 2FFF5D56
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723644226.000000002FDE6000.00000020.00000001.01000000.00000003.sdmp, Offset: 2FDD0000, based on PE: true
                              • Associated: 00000000.00000002.1723484498.000000002FDD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723539110.000000002FDD1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723590669.000000002FDDD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723644226.000000002FDDF000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723928370.000000002FFF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFF8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1724050644.000000002FFFD000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2fdd0000_Comprobante.jbxd
                              Yara matches
                              Similarity
                              • API ID: InformationProcess
                              • String ID: 0
                              • API String ID: 1801817001-4108050209
                              • Opcode ID: 7d08401a11ed3ec0743a01d1df6bb1d70ba57e2b135db9965baad2833af64cc4
                              • Instruction ID: 9c2e006ac6d3fe2969b562916f71e4e3af934824dec132b9c7899a0747c432a8
                              • Opcode Fuzzy Hash: 7d08401a11ed3ec0743a01d1df6bb1d70ba57e2b135db9965baad2833af64cc4
                              • Instruction Fuzzy Hash: AFE0E572845358BBE720EF988D49F9EBBBDEB08B11F540355F600766D4D378190586B1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 2ffef670-2ffef9f9 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 GetModuleHandleW __vbaFreeStrList call 2fff3540 __vbaStrMove __vbaStrToAnsi GetProcAddress __vbaFreeStrList __vbaStrCat __vbaStrMove __vbaStrCat call 2fff3540 __vbaStrMove #644 GetModuleHandleW __vbaFreeStrList __vbaFreeVar __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrToAnsi GetProcAddress __vbaFreeStrList __vbaRedim __vbaNew __vbaObjSet __vbaCastObj __vbaObjSet __vbaObjSetAddref __vbaFreeObjList __vbaObjSetAddref #644 __vbaFreeObj #644 call 2ffc5bae call 2ffc5bbd 9 2ffef9ff-2ffefa02 0->9 10 2ffefa04-2ffefa63 __vbaAryLock #644 __vbaAryUnlock call 2ffc5bae 9->10 11 2ffefa65-2ffefbe9 __vbaObjSetAddref #644 __vbaFreeObj #644 call 2ffc5bcb __vbaAryLock #644 __vbaAryUnlock #644 call 2ffc5bae __vbaRedim #644 call 2ffc5bae #644 call 2ffc5bae __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 9->11 10->9 22 2ffefbeb-2ffefbfc __vbaHresultCheckObj 11->22 23 2ffefc02-2ffefc45 __vbaAryUnlock __vbaFreeStr #644 call 2ffc5bae call 2ffc5bbd 11->23 22->23 28 2ffefc4b-2ffefc4d 23->28 29 2ffefc4f-2ffefca4 __vbaAryLock #644 __vbaAryUnlock call 2ffc5bae 28->29 30 2ffefca6-2ffefdad #644 call 2ffc5bae #644 call 2ffc5bae #644 call 2ffc5bae #644 call 2ffc5bae #644 call 2ffc5bae VirtualProtect 28->30 29->28 43 2ffefdaf-2ffefdc0 __vbaHresultCheckObj 30->43 44 2ffefdc6-2ffefdd8 call 2ffc5bbd 30->44 43->44 47 2ffefdde-2ffefde0 44->47 48 2ffefde2-2ffefe31 __vbaAryLock #644 __vbaAryUnlock call 2ffc5bae 47->48 49 2ffefe33-2ffeff0b #644 call 2ffc5bae #644 call 2ffc5bae #644 call 2ffc5bae call 2fff0130 __vbaFreeVar __vbaAryDestruct 47->49 48->47
                              APIs
                              • __vbaStrCat.MSVBVM60(2FDDD9F8,2FDDD9F0,?,6CF060EF), ref: 2FFEF6FF
                              • __vbaStrMove.MSVBVM60(?,6CF060EF), ref: 2FFEF70C
                              • __vbaStrCat.MSVBVM60(bvm,00000000,?,6CF060EF), ref: 2FFEF714
                              • __vbaStrMove.MSVBVM60(?,6CF060EF), ref: 2FFEF71B
                              • __vbaStrCat.MSVBVM60(2FDDDA10,00000000,?,6CF060EF), ref: 2FFEF723
                              • __vbaStrMove.MSVBVM60(?,6CF060EF), ref: 2FFEF72A
                              • #644.MSVBVM60(00000000,?,6CF060EF), ref: 2FFEF72D
                              • GetModuleHandleW.KERNEL32(00000000,?,6CF060EF), ref: 2FFEF734
                              • __vbaFreeStrList.MSVBVM60(00000003,?,?,?,?,6CF060EF), ref: 2FFEF74D
                                • Part of subcall function 2FFF3540: __vbaVarDup.MSVBVM60(6CE1D8B1,6CE0A323), ref: 2FFF3583
                                • Part of subcall function 2FFF3540: #653.MSVBVM60(?,?), ref: 2FFF3591
                                • Part of subcall function 2FFF3540: __vbaI4Var.MSVBVM60(?), ref: 2FFF359B
                                • Part of subcall function 2FFF3540: __vbaFreeVar.MSVBVM60 ref: 2FFF35B4
                                • Part of subcall function 2FFF3540: #632.MSVBVM60(?,?,?,?), ref: 2FFF35F0
                                • Part of subcall function 2FFF3540: __vbaVarCat.MSVBVM60(?,?,00000008), ref: 2FFF3602
                                • Part of subcall function 2FFF3540: __vbaStrVarMove.MSVBVM60(00000000), ref: 2FFF3609
                                • Part of subcall function 2FFF3540: __vbaStrMove.MSVBVM60 ref: 2FFF3614
                                • Part of subcall function 2FFF3540: __vbaFreeVarList.MSVBVM60(00000003,00000002,?,?), ref: 2FFF3624
                                • Part of subcall function 2FFF3540: __vbaFreeVar.MSVBVM60(2FFF3669), ref: 2FFF3662
                              • __vbaStrMove.MSVBVM60(?,6CF060EF), ref: 2FFEF77A
                              • __vbaStrToAnsi.MSVBVM60(?,00000000,?,6CF060EF), ref: 2FFEF781
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 2FFEF78F
                              • __vbaFreeStrList.MSVBVM60(00000002,?,?,?,6CF060EF), ref: 2FFEF7A4
                              • __vbaStrCat.MSVBVM60(2FDDDA6C,2FDDDA60), ref: 2FFEF7B7
                              • __vbaStrMove.MSVBVM60 ref: 2FFEF7BE
                              • __vbaStrCat.MSVBVM60(2FDDDA80,00000000), ref: 2FFEF7C6
                              • __vbaStrMove.MSVBVM60 ref: 2FFEF7F3
                              • #644.MSVBVM60(00000000), ref: 2FFEF7F6
                              • GetModuleHandleW.KERNEL32(00000000), ref: 2FFEF7FD
                              • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 2FFEF812
                              • __vbaFreeVar.MSVBVM60 ref: 2FFEF81E
                              • __vbaStrCat.MSVBVM60(2FDDD8CC,2FDDDA98), ref: 2FFEF82E
                              • __vbaStrMove.MSVBVM60 ref: 2FFEF835
                              • __vbaStrCat.MSVBVM60(2FDDD8D4,00000000), ref: 2FFEF83D
                              • __vbaStrMove.MSVBVM60 ref: 2FFEF844
                              • __vbaStrCat.MSVBVM60(2FDDDAA0,00000000), ref: 2FFEF84C
                              • __vbaStrMove.MSVBVM60 ref: 2FFEF853
                              • __vbaStrCat.MSVBVM60(2FDDDAA8,00000000), ref: 2FFEF85B
                              • __vbaStrMove.MSVBVM60 ref: 2FFEF862
                              • __vbaStrCat.MSVBVM60(2FDDDAB0,00000000), ref: 2FFEF86A
                              • __vbaStrMove.MSVBVM60 ref: 2FFEF871
                              • __vbaStrCat.MSVBVM60(2FDDDAB8,00000000), ref: 2FFEF879
                              • __vbaStrMove.MSVBVM60 ref: 2FFEF880
                              • __vbaStrCat.MSVBVM60(2FDDDAC0,00000000), ref: 2FFEF888
                              • __vbaStrMove.MSVBVM60 ref: 2FFEF88F
                              • __vbaStrCat.MSVBVM60(2FDDD8D4,00000000), ref: 2FFEF897
                              • __vbaStrMove.MSVBVM60 ref: 2FFEF89E
                              • __vbaStrCat.MSVBVM60(2FDDDAC8,00000000), ref: 2FFEF8A6
                              • __vbaStrMove.MSVBVM60 ref: 2FFEF8AD
                              • __vbaStrCat.MSVBVM60(2FDDDAA0,00000000), ref: 2FFEF8B5
                              • __vbaStrMove.MSVBVM60 ref: 2FFEF8BC
                              • __vbaStrCat.MSVBVM60(2FDDDAD0,00000000), ref: 2FFEF8C4
                              • __vbaStrMove.MSVBVM60 ref: 2FFEF8CB
                              • __vbaStrCat.MSVBVM60(2FDDDAD8,00000000), ref: 2FFEF8D3
                              • __vbaStrMove.MSVBVM60 ref: 2FFEF8DA
                              • __vbaStrCat.MSVBVM60(2FDDDAA0,00000000), ref: 2FFEF8E2
                              • __vbaStrMove.MSVBVM60 ref: 2FFEF8E9
                              • __vbaStrToAnsi.MSVBVM60(?,00000000), ref: 2FFEF8F0
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 2FFEF8FE
                              • __vbaFreeStrList.MSVBVM60(0000000E,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 2FFEF943
                              • __vbaRedim.MSVBVM60(00000080,00000004,?,00000003,00000001,0000000F,00000000), ref: 2FFEF95B
                              • __vbaNew.MSVBVM60(2FDDDAFC,2FDDDB0C), ref: 2FFEF96E
                              • __vbaObjSet.MSVBVM60(?,00000000), ref: 2FFEF979
                              • __vbaCastObj.MSVBVM60(00000000), ref: 2FFEF980
                              • __vbaObjSet.MSVBVM60(?,00000000), ref: 2FFEF98B
                              • __vbaObjSetAddref.MSVBVM60(2FFF82D0,00000000), ref: 2FFEF999
                              • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 2FFEF9A9
                              • __vbaObjSetAddref.MSVBVM60(?), ref: 2FFEF9BF
                              • #644.MSVBVM60(00000000), ref: 2FFEF9C6
                              • __vbaFreeObj.MSVBVM60 ref: 2FFEF9D2
                              • #644.MSVBVM60(?), ref: 2FFEF9DC
                              • __vbaAryLock.MSVBVM60(?,?,?,?,00000000), ref: 2FFEFA0C
                              • #644.MSVBVM60(?), ref: 2FFEFA24
                              • __vbaAryUnlock.MSVBVM60(?), ref: 2FFEFA34
                              • __vbaObjSetAddref.MSVBVM60(?,?,?,?,00000000), ref: 2FFEFA71
                              • #644.MSVBVM60(00000000,?,?,?,00000000), ref: 2FFEFA78
                              • __vbaFreeObj.MSVBVM60(?,?,?,00000000), ref: 2FFEFA84
                              • #644.MSVBVM60(2FFF82CC,?,?,?,00000000), ref: 2FFEFA93
                              • __vbaAryLock.MSVBVM60(?,?,00000000,?,00000004,?,?,?,00000000), ref: 2FFEFAB3
                              • #644.MSVBVM60(?,?,?,?,00000000), ref: 2FFEFAC8
                              • __vbaAryUnlock.MSVBVM60(?,?,?,?,00000000), ref: 2FFEFAD8
                              • #644.MSVBVM60(?,?,?,?,00000000), ref: 2FFEFAF1
                              • __vbaRedim.MSVBVM60(00000080,00000004,2FFF8214,00000003,00000001,00000010,00000000,00000000,?,?,?,?,00000000), ref: 2FFEFB2D
                              • #644.MSVBVM60(?), ref: 2FFEFB3A
                              • #644.MSVBVM60(?,-0000000C,00000000), ref: 2FFEFB60
                              • __vbaAryLock.MSVBVM60(?,00000000,00000000,-0000000C), ref: 2FFEFB8C
                              • __vbaStrCat.MSVBVM60(2FDDDB34,2FDDDB2C,?,00000040), ref: 2FFEFBC2
                              • __vbaStrMove.MSVBVM60 ref: 2FFEFBC9
                              • __vbaI4Str.MSVBVM60(00000000), ref: 2FFEFBCC
                              • VirtualProtect.KERNELBASE(?,00000000), ref: 2FFEFBE2
                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,2FDDDB0C,0000002C,?,00000000), ref: 2FFEFBFC
                              • __vbaAryUnlock.MSVBVM60(?,?,00000000), ref: 2FFEFC06
                              • __vbaFreeStr.MSVBVM60(?,00000000), ref: 2FFEFC0F
                              • #644.MSVBVM60(?,?,00000000), ref: 2FFEFC1F
                              • __vbaAryLock.MSVBVM60(?,00000000,00000000,00000000,-0000000C,?,00000000), ref: 2FFEFC5A
                              • #644.MSVBVM60(?,?,00000000), ref: 2FFEFC71
                              • __vbaAryUnlock.MSVBVM60(?,?,00000000), ref: 2FFEFC7D
                              • #644.MSVBVM60(00000040,00000000,00000000,-0000000C,?,00000000), ref: 2FFEFCB7
                              • #644.MSVBVM60(0424448B,00000000,?,?,00000000), ref: 2FFEFCDD
                              • #644.MSVBVM60(408B008B,00000000,?,?,00000000), ref: 2FFEFD03
                              • #644.MSVBVM60(20C4832C,00000000,?,?,00000000), ref: 2FFEFD29
                              • #644.MSVBVM60(E02474FF,00000000,?,?,00000000), ref: 2FFEFD4F
                              • VirtualProtect.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000008,00000040,?,00000000,?,?,00000000), ref: 2FFEFDA6
                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,2FDDDB0C,00000020,?,00000000), ref: 2FFEFDC0
                              • __vbaAryLock.MSVBVM60(?,00000000,00000000,?,00000000), ref: 2FFEFDEC
                              • #644.MSVBVM60(?,?,00000000), ref: 2FFEFE03
                              • __vbaAryUnlock.MSVBVM60(?,?,00000000), ref: 2FFEFE0F
                              • #644.MSVBVM60(2FFF82CC,00000000,?,00000000), ref: 2FFEFE3C
                              • #644.MSVBVM60(00000000,00000000,?,?,00000000), ref: 2FFEFE55
                              • #644.MSVBVM60(-00000004,00000000,00000000,?,00000000), ref: 2FFEFE6D
                              • __vbaFreeVar.MSVBVM60(?,-00000004,00000000,?,00000000), ref: 2FFEFE8B
                              • __vbaAryDestruct.MSVBVM60(00000000,?,2FFEFF0C,?,00000000), ref: 2FFEFF05
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723644226.000000002FDE6000.00000020.00000001.01000000.00000003.sdmp, Offset: 2FDD0000, based on PE: true
                              • Associated: 00000000.00000002.1723484498.000000002FDD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723539110.000000002FDD1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723590669.000000002FDDD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723644226.000000002FDDF000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723928370.000000002FFF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFF8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1724050644.000000002FFFD000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2fdd0000_Comprobante.jbxd
                              Yara matches
                              Similarity
                              • API ID: __vba$#644Move$Free$List$LockUnlock$Addref$AddressAnsiCheckHandleHresultModuleProcProtectRedimVirtual$#632#653CastDestruct
                              • String ID: @$DqlqlqFquqnqcqtqiqoqnqCqaqlqlq$bvm
                              • API String ID: 3776562771-683613472
                              • Opcode ID: 1612472a0cdf68550edad45eaa83b93fa066e4a49ab1853541c72af12ea92d5a
                              • Instruction ID: 5840592ee5eb4cd59262bfa9e203703b8ff3a3b8cf926dfd96ed58bb9b9c4bbe
                              • Opcode Fuzzy Hash: 1612472a0cdf68550edad45eaa83b93fa066e4a49ab1853541c72af12ea92d5a
                              • Instruction Fuzzy Hash: 4242D9B2D00219AFDB14DFA5CC84EAEBBB9FF48310F108659E506E7394DA74A945CF60

                              Control-flow Graph

                              APIs
                              • __vbaFreeVar.MSVBVM60(?), ref: 2FFF57E2
                                • Part of subcall function 2FFEF670: __vbaStrCat.MSVBVM60(2FDDD9F8,2FDDD9F0,?,6CF060EF), ref: 2FFEF6FF
                                • Part of subcall function 2FFEF670: __vbaStrMove.MSVBVM60(?,6CF060EF), ref: 2FFEF70C
                                • Part of subcall function 2FFEF670: __vbaStrCat.MSVBVM60(bvm,00000000,?,6CF060EF), ref: 2FFEF714
                                • Part of subcall function 2FFEF670: __vbaStrMove.MSVBVM60(?,6CF060EF), ref: 2FFEF71B
                                • Part of subcall function 2FFEF670: __vbaStrCat.MSVBVM60(2FDDDA10,00000000,?,6CF060EF), ref: 2FFEF723
                                • Part of subcall function 2FFEF670: __vbaStrMove.MSVBVM60(?,6CF060EF), ref: 2FFEF72A
                                • Part of subcall function 2FFEF670: #644.MSVBVM60(00000000,?,6CF060EF), ref: 2FFEF72D
                                • Part of subcall function 2FFEF670: GetModuleHandleW.KERNEL32(00000000,?,6CF060EF), ref: 2FFEF734
                                • Part of subcall function 2FFEF670: __vbaFreeStrList.MSVBVM60(00000003,?,?,?,?,6CF060EF), ref: 2FFEF74D
                                • Part of subcall function 2FFEF670: __vbaStrMove.MSVBVM60(?,6CF060EF), ref: 2FFEF77A
                                • Part of subcall function 2FFEF670: __vbaStrToAnsi.MSVBVM60(?,00000000,?,6CF060EF), ref: 2FFEF781
                                • Part of subcall function 2FFEF670: GetProcAddress.KERNEL32(00000000,00000000), ref: 2FFEF78F
                                • Part of subcall function 2FFEF670: __vbaFreeStrList.MSVBVM60(00000002,?,?,?,6CF060EF), ref: 2FFEF7A4
                                • Part of subcall function 2FFF5D10: NtSetInformationProcess.NTDLL ref: 2FFF5D56
                              • __vbaFreeVar.MSVBVM60(00000000), ref: 2FFF57F5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723539110.000000002FDD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 2FDD0000, based on PE: true
                              • Associated: 00000000.00000002.1723484498.000000002FDD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723590669.000000002FDDD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723644226.000000002FDDF000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723644226.000000002FDE6000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723928370.000000002FFF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFF8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1724050644.000000002FFFD000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2fdd0000_Comprobante.jbxd
                              Yara matches
                              Similarity
                              • API ID: __vba$FreeMove$List$#644AddressAnsiHandleInformationModuleProcProcess
                              • String ID:
                              • API String ID: 20434910-0
                              • Opcode ID: c896e458f568ee7553a3a6abfe844c83a5c15cb50dc47f6d79281ff0014b217c
                              • Instruction ID: 0b2d614a77e2c50a56fc9e49b20571d7bf262374d00319f1b1a8bcb789a66ba2
                              • Opcode Fuzzy Hash: c896e458f568ee7553a3a6abfe844c83a5c15cb50dc47f6d79281ff0014b217c
                              • Instruction Fuzzy Hash: 02F01D7281021DABDF24EBA4CD44B9EBB7DFF18600F840629E401B32E0D7386508CAA5
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723644226.000000002FDE6000.00000020.00000001.01000000.00000003.sdmp, Offset: 2FDD0000, based on PE: true
                              • Associated: 00000000.00000002.1723484498.000000002FDD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723539110.000000002FDD1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723590669.000000002FDDD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723644226.000000002FDDF000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723928370.000000002FFF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFF8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1724050644.000000002FFFD000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2fdd0000_Comprobante.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ef41f23567e4e7422021a95af9bb6b13c8200b2295415d293bf1cf4d9d63b1a6
                              • Instruction ID: 59558f5be4993443184884d8788bb99cc758ec3fe3790f3bf89be48c1f7931c5
                              • Opcode Fuzzy Hash: ef41f23567e4e7422021a95af9bb6b13c8200b2295415d293bf1cf4d9d63b1a6
                              • Instruction Fuzzy Hash: 09018C32610127DBC760EB1AC080992B7A7FF70764B8D02A3E5048BB25E2A6F990C651
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723201366.00000000028C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_28c0000_Comprobante.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: edc08f61acc9f5cc15bc5d1fa67eb7274fb49b6e8f41d95be92fd142b7a216f6
                              • Instruction ID: be07d096b4ad70621e1719f25bc1b4f6f367fda3e5eb452956186a21cba4effe
                              • Opcode Fuzzy Hash: edc08f61acc9f5cc15bc5d1fa67eb7274fb49b6e8f41d95be92fd142b7a216f6
                              • Instruction Fuzzy Hash: CEF0A73D229259CFC750CB15C484D36F3EDFB9826876195AEF40ACBA19E334E544CE50
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723201366.00000000028C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_28c0000_Comprobante.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0b399b04e11d1ff954b26d47aa0a54e719ae22316263aa56bc50ae1b8ddb9bc6
                              • Instruction ID: 16fccf18637eeb619204f83f0930361a8bc52be9cda4c1a24b139329881d047b
                              • Opcode Fuzzy Hash: 0b399b04e11d1ff954b26d47aa0a54e719ae22316263aa56bc50ae1b8ddb9bc6
                              • Instruction Fuzzy Hash: 5FF0393B2106549FCA60DB99C480A6AB3E9FB8067173588ADE48DD7A14C330FC42CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723201366.00000000028C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_28c0000_Comprobante.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5206b5fdde261f5c4ffe55f60533539a84919425955c4bd864ae13984b1d46f1
                              • Instruction ID: 6775742beadf8eef3e636b93134f7318793952e22f365c837b85ec0108b16ed0
                              • Opcode Fuzzy Hash: 5206b5fdde261f5c4ffe55f60533539a84919425955c4bd864ae13984b1d46f1
                              • Instruction Fuzzy Hash: F7D012BD211544DFC709AB28F47473533A6EB88729F750CACE006DA981DB3D9485CF12
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723201366.00000000028C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_28c0000_Comprobante.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5731e5a84f94e33c26e754f65156c3b218c94ee109a1d41aab747fae4793ccf0
                              • Instruction ID: 05e8b5742db539e81cc4174594596026e77d48ff69d33bb057d3ffc13d19160b
                              • Opcode Fuzzy Hash: 5731e5a84f94e33c26e754f65156c3b218c94ee109a1d41aab747fae4793ccf0
                              • Instruction Fuzzy Hash: 4DB01239219548CFC2C1CB05C050F1077F8F700600F0110F0F00A8BD11C338E800CD01
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723201366.00000000028C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_28c0000_Comprobante.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dde7dd23c866fd0e5427e328a64a23a4a7a3ee29ed8c7cdc229f235b66456861
                              • Instruction ID: c5fdcd3e73d392331be04f4fdb87fb3375e74b9bbd9d407804a87ba4a80c75b7
                              • Opcode Fuzzy Hash: dde7dd23c866fd0e5427e328a64a23a4a7a3ee29ed8c7cdc229f235b66456861
                              • Instruction Fuzzy Hash: B7B01238114540CFD2D5CF0AC080F1033B8F740600F4501F0F0028F951C734DD00C900
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723201366.00000000028C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_28c0000_Comprobante.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f939d55f2c63572dd8f9070e8f1955d47f255820f43dfd4451017f1251b844b4
                              • Instruction ID: 19f5fbdaeb6b1774d00d12580d3ef4c7ced085c7a95a350a1cf9363335675157
                              • Opcode Fuzzy Hash: f939d55f2c63572dd8f9070e8f1955d47f255820f43dfd4451017f1251b844b4
                              • Instruction Fuzzy Hash: 70B00135266981CFC2A6CB0AC194F6073B8FB04A51F4654F0E4059BE62C338AA00DA40
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723201366.00000000028C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_28c0000_Comprobante.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 01f553cc35015694a6b99fe1575bc5e4f12082bc079a8ea33aad92f6dcddaea6
                              • Instruction ID: 3fbcf16ee543997b5bb480118da3ee13fde7a9222f026dd6911fa0adc062c95f
                              • Opcode Fuzzy Hash: 01f553cc35015694a6b99fe1575bc5e4f12082bc079a8ea33aad92f6dcddaea6
                              • Instruction Fuzzy Hash: 2EB00139266980CFC296DB0AC1A4F5073B8FB05B45F8614F0E4458BA62C338A900CA01
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723201366.00000000028C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_28c0000_Comprobante.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e609441c6bf96b14726226fb1f65896002eed9097537fb59771a22ea209f5011
                              • Instruction ID: 696e96d1acc2f29c2ab54321e1842fe1ea55b3caf99830f55fcef4630c6b48f8
                              • Opcode Fuzzy Hash: e609441c6bf96b14726226fb1f65896002eed9097537fb59771a22ea209f5011
                              • Instruction Fuzzy Hash: D3B00135266981CFD296CB4AC2A4F5073B8FB04A41F4614F1E4058BAA2C338A900CA10
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723201366.00000000028C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 028C0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_28c0000_Comprobante.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a1bbdb82ec5f2f0086ea04d2d42af104018b1aab3f96ec8585fadfab406ea36f
                              • Instruction ID: ca45eebd35cd693e88a0d7199b09ab4cc9d5ab6b7af17f5b962d3ac296bfd03d
                              • Opcode Fuzzy Hash: a1bbdb82ec5f2f0086ea04d2d42af104018b1aab3f96ec8585fadfab406ea36f
                              • Instruction Fuzzy Hash: 50B00136266A80CFC296CB0AC594F5073B8FB05A51F4694F0E4058BE62C738A900CE11

                              Control-flow Graph

                              APIs
                              • __vbaStrCat.MSVBVM60(@o@s@o@f,M@i@c@r), ref: 2FFF3C8D
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3C9A
                              • __vbaStrCat.MSVBVM60(@t@ @E@n@h@a@n,00000000), ref: 2FFF3CA2
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3CA9
                              • __vbaStrCat.MSVBVM60(@c@e@d@ @R@S@,00000000), ref: 2FFF3CB1
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3CB8
                              • __vbaStrCat.MSVBVM60(A@ @a@n,00000000), ref: 2FFF3CC0
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3CC7
                              • __vbaStrCat.MSVBVM60(@d@ @A@E@S@ ,00000000), ref: 2FFF3CCF
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3CD6
                              • __vbaStrCat.MSVBVM60(@C@r@y@,00000000), ref: 2FFF3CDE
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3CE5
                              • __vbaStrCat.MSVBVM60(p@t@o@g@r@a@,00000000), ref: 2FFF3CED
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3CF4
                              • __vbaStrCat.MSVBVM60(p@h@i@c@ @P@r,00000000), ref: 2FFF3CFC
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3D03
                              • __vbaStrCat.MSVBVM60(@o@v@i@d,00000000), ref: 2FFF3D0B
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3D12
                              • __vbaStrCat.MSVBVM60(@e@r@,00000000), ref: 2FFF3D1A
                                • Part of subcall function 2FFF3540: __vbaVarDup.MSVBVM60(6CE1D8B1,6CE0A323), ref: 2FFF3583
                                • Part of subcall function 2FFF3540: #653.MSVBVM60(?,?), ref: 2FFF3591
                                • Part of subcall function 2FFF3540: __vbaI4Var.MSVBVM60(?), ref: 2FFF359B
                                • Part of subcall function 2FFF3540: __vbaFreeVar.MSVBVM60 ref: 2FFF35B4
                                • Part of subcall function 2FFF3540: #632.MSVBVM60(?,?,?,?), ref: 2FFF35F0
                                • Part of subcall function 2FFF3540: __vbaVarCat.MSVBVM60(?,?,00000008), ref: 2FFF3602
                                • Part of subcall function 2FFF3540: __vbaStrVarMove.MSVBVM60(00000000), ref: 2FFF3609
                                • Part of subcall function 2FFF3540: __vbaStrMove.MSVBVM60 ref: 2FFF3614
                                • Part of subcall function 2FFF3540: __vbaFreeVarList.MSVBVM60(00000003,00000002,?,?), ref: 2FFF3624
                                • Part of subcall function 2FFF3540: __vbaFreeVar.MSVBVM60(2FFF3669), ref: 2FFF3662
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3D47
                              • __vbaFreeStrList.MSVBVM60(00000009,?,?,?,?,?,?,?,?,?), ref: 2FFF3D6F
                              • __vbaFreeVar.MSVBVM60 ref: 2FFF3D7B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723539110.000000002FDD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 2FDD0000, based on PE: true
                              • Associated: 00000000.00000002.1723484498.000000002FDD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723590669.000000002FDDD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723644226.000000002FDDF000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723644226.000000002FDE6000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723928370.000000002FFF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFF8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1724050644.000000002FFFD000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2fdd0000_Comprobante.jbxd
                              Yara matches
                              Similarity
                              • API ID: __vba$Move$Free$List$#632#653
                              • String ID: @C@r@y@$@c@e@d@ @R@S@$@d@ @A@E@S@ $@e@r@$@o@s@o@f$@o@v@i@d$@t@ @E@n@h@a@n$A@ @a@n$M@i@c@r$p@h@i@c@ @P@r$p@t@o@g@r@a@
                              • API String ID: 193477259-3817434718
                              • Opcode ID: 2837ef12fa2fe9c6dc0f0dc83774a8ddc15df0959ec087acce58dcd6b162adcd
                              • Instruction ID: 900a3664aedf80b65bfe0366339ec69860adc6c9fd674cc82c57f36d848e5919
                              • Opcode Fuzzy Hash: 2837ef12fa2fe9c6dc0f0dc83774a8ddc15df0959ec087acce58dcd6b162adcd
                              • Instruction Fuzzy Hash: 9B41C972D10259AFDB05EFA9CC84DEEBBB9FF88600B14825BF401A7254DA745909CFA1
                              APIs
                              • __vbaStrCat.MSVBVM60(2FDDE798,2FDDE960), ref: 2FFF3E6D
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3E7A
                              • __vbaStrCat.MSVBVM60(2FDDE608,00000000), ref: 2FFF3E82
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3E89
                              • __vbaStrCat.MSVBVM60(2FDDE528,00000000), ref: 2FFF3E91
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3E98
                              • __vbaStrCat.MSVBVM60(2FDDE708,00000000), ref: 2FFF3EA0
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3EA7
                              • __vbaStrCat.MSVBVM60(2FDDEB0C,00000000), ref: 2FFF3EAF
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3EB6
                              • __vbaStrCat.MSVBVM60(2FDDEB38,00000000), ref: 2FFF3EBE
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3EC5
                              • __vbaStrCat.MSVBVM60(2FDDEB54,00000000), ref: 2FFF3ECD
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3ED4
                              • __vbaStrCat.MSVBVM60(2FDDEB80,00000000), ref: 2FFF3EDC
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3EE3
                              • __vbaStrCat.MSVBVM60(2FDDEBA4,00000000), ref: 2FFF3EEB
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3EF2
                              • __vbaStrCat.MSVBVM60(2FDDEBBC,00000000), ref: 2FFF3EFA
                                • Part of subcall function 2FFF3540: __vbaVarDup.MSVBVM60(6CE1D8B1,6CE0A323), ref: 2FFF3583
                                • Part of subcall function 2FFF3540: #653.MSVBVM60(?,?), ref: 2FFF3591
                                • Part of subcall function 2FFF3540: __vbaI4Var.MSVBVM60(?), ref: 2FFF359B
                                • Part of subcall function 2FFF3540: __vbaFreeVar.MSVBVM60 ref: 2FFF35B4
                                • Part of subcall function 2FFF3540: #632.MSVBVM60(?,?,?,?), ref: 2FFF35F0
                                • Part of subcall function 2FFF3540: __vbaVarCat.MSVBVM60(?,?,00000008), ref: 2FFF3602
                                • Part of subcall function 2FFF3540: __vbaStrVarMove.MSVBVM60(00000000), ref: 2FFF3609
                                • Part of subcall function 2FFF3540: __vbaStrMove.MSVBVM60 ref: 2FFF3614
                                • Part of subcall function 2FFF3540: __vbaFreeVarList.MSVBVM60(00000003,00000002,?,?), ref: 2FFF3624
                                • Part of subcall function 2FFF3540: __vbaFreeVar.MSVBVM60(2FFF3669), ref: 2FFF3662
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3F27
                              • __vbaFreeStrList.MSVBVM60(00000009,?,?,?,?,?,?,?,?,?), ref: 2FFF3F4F
                              • __vbaFreeVar.MSVBVM60 ref: 2FFF3F5B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723539110.000000002FDD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 2FDD0000, based on PE: true
                              • Associated: 00000000.00000002.1723484498.000000002FDD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723590669.000000002FDDD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723644226.000000002FDDF000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723644226.000000002FDE6000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723928370.000000002FFF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFF8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1724050644.000000002FFFD000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2fdd0000_Comprobante.jbxd
                              Yara matches
                              Similarity
                              • API ID: __vba$Move$Free$List$#632#653
                              • String ID:
                              • API String ID: 193477259-0
                              • Opcode ID: 7b7e11ff98aaa61ddfbe02894c4748fc6074a3ea9ee0b167a1e439305ce71dbc
                              • Instruction ID: 5fe3cc485dd620f1131f0efc9e4546e7a998ab03fec4f7e2e5b33508f8506be6
                              • Opcode Fuzzy Hash: 7b7e11ff98aaa61ddfbe02894c4748fc6074a3ea9ee0b167a1e439305ce71dbc
                              • Instruction Fuzzy Hash: 6F41CFB2D1011CABDB55DFA9CC84DEEBBB9EF88700F10815BF402A3254DA746909CFA1
                              APIs
                              • __vbaVarDup.MSVBVM60(6CE1D8B1,6CE0A323), ref: 2FFF3583
                              • #653.MSVBVM60(?,?), ref: 2FFF3591
                              • __vbaI4Var.MSVBVM60(?), ref: 2FFF359B
                              • __vbaFreeVar.MSVBVM60 ref: 2FFF35B4
                              • #632.MSVBVM60(?,?,?,?), ref: 2FFF35F0
                              • __vbaVarCat.MSVBVM60(?,?,00000008), ref: 2FFF3602
                              • __vbaStrVarMove.MSVBVM60(00000000), ref: 2FFF3609
                              • __vbaStrMove.MSVBVM60 ref: 2FFF3614
                              • __vbaFreeVarList.MSVBVM60(00000003,00000002,?,?), ref: 2FFF3624
                              • __vbaFreeVar.MSVBVM60(2FFF3669), ref: 2FFF3662
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723644226.000000002FDE6000.00000020.00000001.01000000.00000003.sdmp, Offset: 2FDD0000, based on PE: true
                              • Associated: 00000000.00000002.1723484498.000000002FDD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723539110.000000002FDD1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723590669.000000002FDDD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723644226.000000002FDDF000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723928370.000000002FFF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFF8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1724050644.000000002FFFD000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2fdd0000_Comprobante.jbxd
                              Yara matches
                              Similarity
                              • API ID: __vba$Free$Move$#632#653List
                              • String ID:
                              • API String ID: 1043057846-0
                              • Opcode ID: 8e6dc45ea9f51805dbfef16227e2cee222c63e8f88b885ce9b7a0bc1c6ca8cdf
                              • Instruction ID: f562cc79226813140eb047ef8389420e5f9e4d45fb9874e8ee3cddc5eb536827
                              • Opcode Fuzzy Hash: 8e6dc45ea9f51805dbfef16227e2cee222c63e8f88b885ce9b7a0bc1c6ca8cdf
                              • Instruction Fuzzy Hash: BE31C8B2C0020DAFDB04DFA5C884EEEBBB9FB48714F008619E525A7390EB785619CF50
                              APIs
                              • #644.MSVBVM60(?,2FFEFF20,00000001,6CEEEC2C,00000000,?,?,?,?,?,?,Function_00001006), ref: 2FFF0187
                              • #644.MSVBVM60(00000001,?,?,?,?,?,?,Function_00001006), ref: 2FFF0192
                              • #644.MSVBVM60(00000000,00000000,00000000,?,?,?,?,?,?,Function_00001006), ref: 2FFF01A4
                              • #644.MSVBVM60(-00000004,00000000,00000000,00000004,?,?,?,?,?,?,Function_00001006), ref: 2FFF01C2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1723644226.000000002FDE6000.00000020.00000001.01000000.00000003.sdmp, Offset: 2FDD0000, based on PE: true
                              • Associated: 00000000.00000002.1723484498.000000002FDD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723539110.000000002FDD1000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723590669.000000002FDDD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723644226.000000002FDDF000.00000020.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723928370.000000002FFF7000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFF8000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1723985843.000000002FFFC000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1724050644.000000002FFFD000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_2fdd0000_Comprobante.jbxd
                              Yara matches
                              Similarity
                              • API ID: #644
                              • String ID:
                              • API String ID: 700137900-0
                              • Opcode ID: 4101a6381b10bc0fb8424739667328de148d4d5a107f858bd6c8a2b4ce079a3a
                              • Instruction ID: eeef7e020e89829340de614454815de086fb8e4e60faf73fda3811529d5f8038
                              • Opcode Fuzzy Hash: 4101a6381b10bc0fb8424739667328de148d4d5a107f858bd6c8a2b4ce079a3a
                              • Instruction Fuzzy Hash: 16118CB1D00208AFD704DBB9CD80EAEBBBEEB48720B14431AE501E33A4D6786D00CB60

                              Execution Graph

                              Execution Coverage:9.3%
                              Dynamic/Decrypted Code Coverage:9.7%
                              Signature Coverage:9.7%
                              Total number of Nodes:31
                              Total number of Limit Nodes:0
                              execution_graph 9208 445d96 9209 445d99 NtAllocateVirtualMemory 9208->9209 9211 445da3 9209->9211 9184 442000 9186 442006 9184->9186 9185 442f77 9186->9185 9188 443296 GetPEB 9186->9188 9189 4432b0 9188->9189 9190 44465f 9188->9190 9192 4432b5 9189->9192 9190->9185 9193 4437be 9192->9193 9198 44609a GetPEB 9193->9198 9195 4443ab 9196 44465f 9195->9196 9197 445df2 GetPEB 9195->9197 9196->9190 9197->9196 9199 4465ce 9200 4465d1 9199->9200 9201 44663d NtProtectVirtualMemory 9200->9201 9202 44668f 9201->9202 9212 44355f 9217 445a2f GetPEB 9212->9217 9214 44357c 9215 44359e 9214->9215 9216 445b91 GetPEB 9214->9216 9216->9215 9218 445a11 9217->9218 9219 3147068 9220 31470ac CheckRemoteDebuggerPresent 9219->9220 9221 31470ee 9220->9221 9203 4464ca 9204 4465d6 9203->9204 9207 445a81 GetPEB 9204->9207
                              Memory Dump Source
                              • Source File: 00000001.00000002.2903933231.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_3140000_RegAsm.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e336a950b91b4fb9557ad425acc4bb1c37d24abe98e74814f1bc7caf128bbec6
                              • Instruction ID: 24935ad35320b3ba0b5997f992ad5f0a863b55eabdbf00e25405e3d25d47535e
                              • Opcode Fuzzy Hash: e336a950b91b4fb9557ad425acc4bb1c37d24abe98e74814f1bc7caf128bbec6
                              • Instruction Fuzzy Hash: BD53E531C10B1A8ADB51EF68C890599F7B1FF99300F15D79AE4587B221FB70AAD4CB81

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 542 3147068-31470ec CheckRemoteDebuggerPresent 544 31470f5-3147130 542->544 545 31470ee-31470f4 542->545 545->544
                              APIs
                              • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 031470DF
                              Memory Dump Source
                              • Source File: 00000001.00000002.2903933231.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_3140000_RegAsm.jbxd
                              Similarity
                              • API ID: CheckDebuggerPresentRemote
                              • String ID:
                              • API String ID: 3662101638-0
                              • Opcode ID: 0dc3d6a6e98914c0e1aa253540fc30ccce2a80bbf8921389a5917f73d101e568
                              • Instruction ID: 5b18c525820707f3ee51cab36ef79e5fb2309263d1f37779c7e94395fc74a227
                              • Opcode Fuzzy Hash: 0dc3d6a6e98914c0e1aa253540fc30ccce2a80bbf8921389a5917f73d101e568
                              • Instruction Fuzzy Hash: 2E2125B28012598FCB10CF9AD984BEEFBF4AF49320F14846AE459B7250D778A944CF65

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 548 4459bd-445da1 NtAllocateVirtualMemory 551 445dc2-445dc6 548->551 552 445da3-44608a 548->552 554 44608d 552->554 554->554
                              APIs
                              • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,?,00003000), ref: 00445D9D
                              Memory Dump Source
                              • Source File: 00000001.00000002.2902848965.0000000000442000.00000040.80000000.00040000.00000000.sdmp, Offset: 00442000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_442000_RegAsm.jbxd
                              Similarity
                              • API ID: AllocateMemoryVirtual
                              • String ID:
                              • API String ID: 2167126740-0
                              • Opcode ID: 283af8b6fff400df6543712bb3061a0b8413ae34f48b2a5070f880ecefdd20e2
                              • Instruction ID: 1a5acb39db5aae2b03a091339b4b330749e96e546191f31a262f57f3db21f8be
                              • Opcode Fuzzy Hash: 283af8b6fff400df6543712bb3061a0b8413ae34f48b2a5070f880ecefdd20e2
                              • Instruction Fuzzy Hash: 5FF0A771508542EFEB05C740C896F9C7BA4BF01308F244296A0429B1D1DA78E602D712

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 555 445c4b-445da1 NtAllocateVirtualMemory 558 445dc2-445dc6 555->558 559 445da3-44608a 555->559 561 44608d 559->561 561->561
                              APIs
                              • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,?,00003000), ref: 00445D9D
                              Memory Dump Source
                              • Source File: 00000001.00000002.2902848965.0000000000442000.00000040.80000000.00040000.00000000.sdmp, Offset: 00442000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_442000_RegAsm.jbxd
                              Similarity
                              • API ID: AllocateMemoryVirtual
                              • String ID:
                              • API String ID: 2167126740-0
                              • Opcode ID: 287b3376fd21f26de0df136aedac01950156459d7427143cf8e8e389bac5d5f2
                              • Instruction ID: 2e84749359dffac31345b85070a828cbe2b98a4c5cf7316c249972bc98c716a2
                              • Opcode Fuzzy Hash: 287b3376fd21f26de0df136aedac01950156459d7427143cf8e8e389bac5d5f2
                              • Instruction Fuzzy Hash: B6F0A77190C6819FF70AC750C865BE93F709F12314F2542EF90428E0D3D92C9606C712

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 562 445d96-445da1 NtAllocateVirtualMemory 565 445dc2-445dc6 562->565 566 445da3-44608a 562->566 568 44608d 566->568 568->568
                              APIs
                              • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,?,00003000), ref: 00445D9D
                              Memory Dump Source
                              • Source File: 00000001.00000002.2902848965.0000000000442000.00000040.80000000.00040000.00000000.sdmp, Offset: 00442000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_442000_RegAsm.jbxd
                              Similarity
                              • API ID: AllocateMemoryVirtual
                              • String ID:
                              • API String ID: 2167126740-0
                              • Opcode ID: 61a393746a203315afd59c6e3be928e985eb98682a7d78fafb5053d0dd83222d
                              • Instruction ID: 8edfb8ee8904fb40599f40bf4ab24fd4cd20ffa869e4555b0818ac8740eb5c7c
                              • Opcode Fuzzy Hash: 61a393746a203315afd59c6e3be928e985eb98682a7d78fafb5053d0dd83222d
                              • Instruction Fuzzy Hash: B9D05E3190D581CFFB068B14C8547AC7B62AF62308B1A40E2D0868E5EACA3CDA06D716

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 569 3143e68-3143ece 571 3143ed0-3143edb 569->571 572 3143f18-3143f1a 569->572 571->572 573 3143edd-3143ee9 571->573 574 3143f1c-3143f74 572->574 575 3143f0c-3143f16 573->575 576 3143eeb-3143ef5 573->576 583 3143f76-3143f81 574->583 584 3143fbe-3143fc0 574->584 575->574 577 3143ef7 576->577 578 3143ef9-3143f08 576->578 577->578 578->578 580 3143f0a 578->580 580->575 583->584 586 3143f83-3143f8f 583->586 585 3143fc2-3143fda 584->585 593 3144024-3144026 585->593 594 3143fdc-3143fe7 585->594 587 3143f91-3143f9b 586->587 588 3143fb2-3143fbc 586->588 589 3143f9d 587->589 590 3143f9f-3143fae 587->590 588->585 589->590 590->590 592 3143fb0 590->592 592->588 596 3144028-3144076 593->596 594->593 595 3143fe9-3143ff5 594->595 597 3143ff7-3144001 595->597 598 3144018-3144022 595->598 604 314407c-314408a 596->604 600 3144005-3144014 597->600 601 3144003 597->601 598->596 600->600 602 3144016 600->602 601->600 602->598 605 3144093-31440f3 604->605 606 314408c-3144092 604->606 613 31440f5-31440f9 605->613 614 3144103-3144107 605->614 606->605 613->614 615 31440fb 613->615 616 3144117-314411b 614->616 617 3144109-314410d 614->617 615->614 619 314411d-3144121 616->619 620 314412b-314412f 616->620 617->616 618 314410f-3144112 call 3140ab8 617->618 618->616 619->620 622 3144123-3144126 call 3140ab8 619->622 623 3144131-3144135 620->623 624 314413f-3144143 620->624 622->620 623->624 625 3144137-314413a call 3140ab8 623->625 626 3144145-3144149 624->626 627 3144153-3144157 624->627 625->624 626->627 630 314414b 626->630 631 3144167 627->631 632 3144159-314415d 627->632 630->627 634 3144168 631->634 632->631 633 314415f 632->633 633->631 634->634
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2903933231.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_3140000_RegAsm.jbxd
                              Similarity
                              • API ID:
                              • String ID: \VJm
                              • API String ID: 0-4047210350
                              • Opcode ID: 7064492c5278617e9b387b6505488b0d6e3c1d6f1b71efe7a19d5430a05dbdc0
                              • Instruction ID: 7de18c89a0ee14ed95421dfc874d67b36fd062cc7f493cc9ac6ca21249d2ab1b
                              • Opcode Fuzzy Hash: 7064492c5278617e9b387b6505488b0d6e3c1d6f1b71efe7a19d5430a05dbdc0
                              • Instruction Fuzzy Hash: 7B917E70E002099FDF14CFAAD9917DDBBF2AF8C714F188529E414AB294EB349895CB81
                              Memory Dump Source
                              • Source File: 00000001.00000002.2903933231.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_3140000_RegAsm.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d4674140c8241ef8f2fb6918ac9500c101739d54a77d7fd1a429025b08f9e1e9
                              • Instruction ID: 01e6a9c45ae67c263ea8599ac1c99b501d4e74aa28e7a0ce2f0ffd5705eb559e
                              • Opcode Fuzzy Hash: d4674140c8241ef8f2fb6918ac9500c101739d54a77d7fd1a429025b08f9e1e9
                              • Instruction Fuzzy Hash: B2B13F70E002098FDB14CFAAD99579DBBF2AF8C714F188529D415EB294EF749885CB81

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 536 3147060-31470ec CheckRemoteDebuggerPresent 538 31470f5-3147130 536->538 539 31470ee-31470f4 536->539 539->538
                              APIs
                              • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 031470DF
                              Memory Dump Source
                              • Source File: 00000001.00000002.2903933231.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_3140000_RegAsm.jbxd
                              Similarity
                              • API ID: CheckDebuggerPresentRemote
                              • String ID:
                              • API String ID: 3662101638-0
                              • Opcode ID: ffd049d84b2a32df6a822973c5f24129f64c934d540eed46dd6c16dac98c70a8
                              • Instruction ID: fea47be876ce9ebe8e72001d0533992186eb49feb0c085a836f242390bb3e4b8
                              • Opcode Fuzzy Hash: ffd049d84b2a32df6a822973c5f24129f64c934d540eed46dd6c16dac98c70a8
                              • Instruction Fuzzy Hash: E12136B280125ACFCB10CFA9D985BEEFBF4AF49320F14846AE455B3250D778A944CF60
                              Memory Dump Source
                              • Source File: 00000001.00000002.2903338328.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_153d000_RegAsm.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 272eae68816956346685a6ca25ab4904ae1fccce93ee77c20effd60f1fe7bbf9
                              • Instruction ID: df177c86d5297a6853e3924bc7f5c7fa2764d34d89223de8363d7c8091b17c7a
                              • Opcode Fuzzy Hash: 272eae68816956346685a6ca25ab4904ae1fccce93ee77c20effd60f1fe7bbf9
                              • Instruction Fuzzy Hash: 70210071604200DFCB15DFA8D984B2AFBB5FB84B14F60C969D8494F256D33AD446CA61
                              Memory Dump Source
                              • Source File: 00000001.00000002.2903338328.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_153d000_RegAsm.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ba8cd123528781676b86ac6fc5f931996ee33609d3a4ab10b7c71828b73696fe
                              • Instruction ID: ed6e79787eaa7cf07b400861fbef12c20de2a10e7a74e3f41da667c7ef8ef8e6
                              • Opcode Fuzzy Hash: ba8cd123528781676b86ac6fc5f931996ee33609d3a4ab10b7c71828b73696fe
                              • Instruction Fuzzy Hash: 34217C755093808FDB02CF64D994B15BF71FB86614F28C5EAD8498F667C33A980ACB62
                              Memory Dump Source
                              • Source File: 00000001.00000002.2903933231.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_3140000_RegAsm.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 75f15112cbad85265ebe5e33700325f9c5acee497581ad18fac644bebe59db28
                              • Instruction ID: 2a4d17828966ea3bd7bb127e641c50cc93c31bed14147263d58259bfea99a477
                              • Opcode Fuzzy Hash: 75f15112cbad85265ebe5e33700325f9c5acee497581ad18fac644bebe59db28
                              • Instruction Fuzzy Hash: EF23E931D10B198ECB11EF68C8945ADF7B1FF99300F15D79AE458AB221EB70AAC5CB41
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2903933231.0000000003140000.00000040.00000800.00020000.00000000.sdmp, Offset: 03140000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_3140000_RegAsm.jbxd
                              Similarity
                              • API ID:
                              • String ID: \VJm
                              • API String ID: 0-4047210350
                              • Opcode ID: 5f1f4c30f35e8ad3e4b2360e044e032357efadb5f6d53ac31c835a8a96d5581c
                              • Instruction ID: 5cee0b8a4583c89367038b836273fe5ff7c3eb0b1faba215c851a86aae5d2bd4
                              • Opcode Fuzzy Hash: 5f1f4c30f35e8ad3e4b2360e044e032357efadb5f6d53ac31c835a8a96d5581c
                              • Instruction Fuzzy Hash: 61B15E70E00219CFDF10CFAAD99579DBBF2AF8C714F188529D419AB254EF749845CB81