{"Exfil Mode": "SMTP", "SMTP Info": "dsmoon@panstar.ltdmmm777mail.privateemail.com"}
Source: Process started | Author: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CPaFDuSsVdolxV' /XML 'C:\Users\user\AppData\Local\Temp\tmp777C.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CPaFDuSsVdolxV' /XML 'C:\Users\user\AppData\Local\Temp\tmp777C.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\DHL_document1102202068090891.exe' , ParentImage: C:\Users\user\Desktop\DHL_document1102202068090891.exe, ParentProcessId: 6268, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CPaFDuSsVdolxV' /XML 'C:\Users\user\AppData\Local\Temp\tmp777C.tmp', ProcessId: 6436 |
Source: 1.2.DHL_document1102202068090891.exe.141f00a8.3.unpack | Malware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "dsmoon@panstar.ltdmmm777mail.privateemail.com"} |
Source: C:\Users\user\AppData\Roaming\CPaFDuSsVdolxV.exe | Virustotal: Detection: 35% | Perma Link |
Source: C:\Users\user\AppData\Roaming\CPaFDuSsVdolxV.exe | ReversingLabs: Detection: 46% |
Source: DHL_document1102202068090891.exe | Virustotal: Detection: 35% | Perma Link |
Source: DHL_document1102202068090891.exe | ReversingLabs: Detection: 46% |
Source: C:\Users\user\AppData\Roaming\CPaFDuSsVdolxV.exe | Joe Sandbox ML: detected |
Source: DHL_document1102202068090891.exe | Joe Sandbox ML: detected |
Source: DHL_document1102202068090891.exe | Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT |
Source: DHL_document1102202068090891.exe, 00000001.00000002.222667109.0000000002671000.00000004.00000001.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: DHL_document1102202068090891.exe, 00000001.00000002.222727824.00000000026FB000.00000004.00000001.sdmp | String found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/bootstrap.min.css |
Source: DHL_document1102202068090891.exe, Startup.cs | Long String: Length: 62808 |
Source: CPaFDuSsVdolxV.exe.1.dr, Startup.cs | Long String: Length: 62808 |
Source: 1.2.DHL_document1102202068090891.exe.3b0000.0.unpack, Startup.cs | Long String: Length: 62808 |
Source: 6.2.DHL_document1102202068090891.exe.2c0000.0.unpack, Startup.cs | Long String: Length: 62808 |
Source: 6.0.DHL_document1102202068090891.exe.2c0000.0.unpack, Startup.cs | Long String: Length: 62808 |
Source: 7.0.DHL_document1102202068090891.exe.b90000.0.unpack, Startup.cs | Long String: Length: 62808 |
Source: 7.2.DHL_document1102202068090891.exe.b90000.0.unpack, Startup.cs | Long String: Length: 62808 |
Source: 8.0.DHL_document1102202068090891.exe.630000.0.unpack, Startup.cs | Long String: Length: 62808 |
Source: 8.2.DHL_document1102202068090891.exe.630000.0.unpack, Startup.cs | Long String: Length: 62808 |
Source: 9.2.DHL_document1102202068090891.exe.bd0000.0.unpack, Startup.cs | Long String: Length: 62808 |
Source: 9.0.DHL_document1102202068090891.exe.bd0000.0.unpack, Startup.cs | Long String: Length: 62808 |
Source: 10.2.DHL_document1102202068090891.exe.640000.0.unpack, Startup.cs | Long String: Length: 62808 |
Source: 10.0.DHL_document1102202068090891.exe.640000.0.unpack, Startup.cs | Long String: Length: 62808 |
Source: initial sample | Static PE information: Filename: DHL_document1102202068090891.exe |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 6_2_002C2050 | 6_2_002C2050 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 7_2_00B92050 | 7_2_00B92050 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 8_2_00632050 | 8_2_00632050 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 9_2_00BD2050 | 9_2_00BD2050 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 10_2_00642050 | 10_2_00642050 |
Source: DHL_document1102202068090891.exe, 00000001.00000002.225096082.000000001AF40000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenamemscorrc.dllT vs DHL_document1102202068090891.exe |
Source: DHL_document1102202068090891.exe, 00000001.00000002.222448059.00000000009FA000.00000004.00000020.sdmp | Binary or memory string: OriginalFilenameclr.dllT vs DHL_document1102202068090891.exe |
Source: DHL_document1102202068090891.exe, 00000001.00000002.225821487.000000001B0F0000.00000002.00000001.sdmp | Binary or memory string: originalfilename vs DHL_document1102202068090891.exe |
Source: DHL_document1102202068090891.exe, 00000001.00000002.225821487.000000001B0F0000.00000002.00000001.sdmp | Binary or memory string: OriginalFilenamepropsys.dll.mui@ vs DHL_document1102202068090891.exe |
Source: DHL_document1102202068090891.exe, 00000001.00000002.222667109.0000000002671000.00000004.00000001.sdmp | Binary or memory string: OriginalFilenameAsyncState.dllF vs DHL_document1102202068090891.exe |
Source: DHL_document1102202068090891.exe, 00000001.00000000.207751008.0000000000450000.00000002.00020000.sdmp | Binary or memory string: OriginalFilenameXmlIgnoreMemberAttribute.exe@ vs DHL_document1102202068090891.exe |
Source: DHL_document1102202068090891.exe, 00000001.00000002.226505171.000000001BCB0000.00000002.00000001.sdmp | Binary or memory string: System.OriginalFileName vs DHL_document1102202068090891.exe |
Source: DHL_document1102202068090891.exe, 00000006.00000000.216868947.0000000000360000.00000002.00020000.sdmp | Binary or memory string: OriginalFilenameXmlIgnoreMemberAttribute.exe@ vs DHL_document1102202068090891.exe |
Source: DHL_document1102202068090891.exe, 00000007.00000002.217906373.0000000000C30000.00000002.00020000.sdmp | Binary or memory string: OriginalFilenameXmlIgnoreMemberAttribute.exe@ vs DHL_document1102202068090891.exe |
Source: DHL_document1102202068090891.exe, 00000008.00000002.218813485.00000000006D0000.00000002.00020000.sdmp | Binary or memory string: OriginalFilenameXmlIgnoreMemberAttribute.exe@ vs DHL_document1102202068090891.exe |
Source: DHL_document1102202068090891.exe, 00000009.00000002.219739263.0000000000C70000.00000002.00020000.sdmp | Binary or memory string: OriginalFilenameXmlIgnoreMemberAttribute.exe@ vs DHL_document1102202068090891.exe |
Source: DHL_document1102202068090891.exe, 0000000A.00000002.222029719.00000000006E0000.00000002.00020000.sdmp | Binary or memory string: OriginalFilenameXmlIgnoreMemberAttribute.exe@ vs DHL_document1102202068090891.exe |
Source: DHL_document1102202068090891.exe | Binary or memory string: OriginalFilenameXmlIgnoreMemberAttribute.exe@ vs DHL_document1102202068090891.exe |
Source: DHL_document1102202068090891.exe | Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
Source: CPaFDuSsVdolxV.exe.1.dr | Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
Source: classification engine | Classification label: mal100.troj.evad.winEXE@14/4@0/0 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | File created: C:\Users\user\AppData\Roaming\CPaFDuSsVdolxV.exe | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6444:120:WilError_01 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | File created: C:\Users\user\AppData\Local\Temp\tmp777C.tmp | Jump to behavior |
Source: DHL_document1102202068090891.exe | Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | File read: C:\Users\user\Desktop\desktop.ini | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers | Jump to behavior |
Source: DHL_document1102202068090891.exe, 00000001.00000002.222727824.00000000026FB000.00000004.00000001.sdmp | Binary or memory string: INSERT INTO Itens_Aluguel VALUES(@aluguelID, @aviaoID, @validade); |
Source: DHL_document1102202068090891.exe, 00000001.00000002.222727824.00000000026FB000.00000004.00000001.sdmp | Binary or memory string: Insert into Clientes values (@nome, @cpf, @rg, @cidade, @endereco, @uf, @telefone); |
Source: DHL_document1102202068090891.exe | Virustotal: Detection: 35% |
Source: DHL_document1102202068090891.exe | ReversingLabs: Detection: 46% |
Source: DHL_document1102202068090891.exe | String found in binary or memory: New/Load Game |
Source: DHL_document1102202068090891.exe | String found in binary or memory: New/Load Game |
Source: DHL_document1102202068090891.exe | String found in binary or memory: New/Load Game |
Source: DHL_document1102202068090891.exe | String found in binary or memory: New/Load Game |
Source: DHL_document1102202068090891.exe | String found in binary or memory: New/Load Game |
Source: DHL_document1102202068090891.exe | String found in binary or memory: New/Load Game |
Source: DHL_document1102202068090891.exe | String found in binary or memory: New/Load Game |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | File read: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Jump to behavior |
Source: unknown | Process created: C:\Users\user\Desktop\DHL_document1102202068090891.exe 'C:\Users\user\Desktop\DHL_document1102202068090891.exe' | |
Source: unknown | Process created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CPaFDuSsVdolxV' /XML 'C:\Users\user\AppData\Local\Temp\tmp777C.tmp' | |
Source: unknown | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: unknown | Process created: C:\Users\user\Desktop\DHL_document1102202068090891.exe C:\Users\user\Desktop\DHL_document1102202068090891.exe | |
Source: unknown | Process created: C:\Users\user\Desktop\DHL_document1102202068090891.exe C:\Users\user\Desktop\DHL_document1102202068090891.exe | |
Source: unknown | Process created: C:\Users\user\Desktop\DHL_document1102202068090891.exe C:\Users\user\Desktop\DHL_document1102202068090891.exe | |
Source: unknown | Process created: C:\Users\user\Desktop\DHL_document1102202068090891.exe C:\Users\user\Desktop\DHL_document1102202068090891.exe | |
Source: unknown | Process created: C:\Users\user\Desktop\DHL_document1102202068090891.exe C:\Users\user\Desktop\DHL_document1102202068090891.exe | |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CPaFDuSsVdolxV' /XML 'C:\Users\user\AppData\Local\Temp\tmp777C.tmp' | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process created: C:\Users\user\Desktop\DHL_document1102202068090891.exe C:\Users\user\Desktop\DHL_document1102202068090891.exe | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process created: C:\Users\user\Desktop\DHL_document1102202068090891.exe C:\Users\user\Desktop\DHL_document1102202068090891.exe | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process created: C:\Users\user\Desktop\DHL_document1102202068090891.exe C:\Users\user\Desktop\DHL_document1102202068090891.exe | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process created: C:\Users\user\Desktop\DHL_document1102202068090891.exe C:\Users\user\Desktop\DHL_document1102202068090891.exe | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process created: C:\Users\user\Desktop\DHL_document1102202068090891.exe C:\Users\user\Desktop\DHL_document1102202068090891.exe | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32 | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | File opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll | Jump to behavior |
Source: DHL_document1102202068090891.exe | Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: DHL_document1102202068090891.exe | Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 1_2_00007FFAEED386E4 push 00000074h; retf | 1_2_00007FFAEED386EC |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 1_2_00007FFAEED31FE5 push 00000074h; retf | 1_2_00007FFAEED31FEA |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 1_2_00007FFAEED38E1D push 00000074h; retf | 1_2_00007FFAEED38E1F |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 1_2_00007FFAEED3E5CC push 00000074h; retf | 1_2_00007FFAEED3E5D8 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 1_2_00007FFAEED3D327 push 00000074h; retf | 1_2_00007FFAEED3D329 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 6_2_002CE12B push es; ret | 6_2_002CE130 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 6_2_002CE00F push es; ret | 6_2_002CE0FA |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 6_2_002CE00F push es; ret | 6_2_002CE100 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 6_2_002CE101 push es; ret | 6_2_002CE12A |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 6_2_002CE119 push es; ret | 6_2_002CE12A |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 6_2_002CE143 push es; ret | 6_2_002CE148 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 6_2_002CE3B3 push cs; ret | 6_2_002CE3DC |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 6_2_002CE0E9 push es; ret | 6_2_002CE100 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 6_2_002CE3CB push cs; ret | 6_2_002CE3DC |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 6_2_002CE3DD push cs; ret | 6_2_002CE3E2 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 7_2_00B9E3B3 push cs; ret | 7_2_00B9E3DC |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 7_2_00B9E0E9 push es; ret | 7_2_00B9E100 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 7_2_00B9E3DD push cs; ret | 7_2_00B9E3E2 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 7_2_00B9E3CB push cs; ret | 7_2_00B9E3DC |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 7_2_00B9E12B push es; ret | 7_2_00B9E130 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 7_2_00B9E119 push es; ret | 7_2_00B9E12A |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 7_2_00B9E00F push es; ret | 7_2_00B9E0FA |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 7_2_00B9E00F push es; ret | 7_2_00B9E100 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 7_2_00B9E101 push es; ret | 7_2_00B9E12A |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 7_2_00B9E143 push es; ret | 7_2_00B9E148 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 8_2_0063E143 push es; ret | 8_2_0063E148 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 8_2_0063E12B push es; ret | 8_2_0063E130 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 8_2_0063E101 push es; ret | 8_2_0063E12A |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 8_2_0063E00F push es; ret | 8_2_0063E0FA |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 8_2_0063E00F push es; ret | 8_2_0063E100 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Code function: 8_2_0063E119 push es; ret | 8_2_0063E12A |
Source: initial sample | Static PE information: section name: .text entropy: 7.42024887676 |
Source: initial sample | Static PE information: section name: .text entropy: 7.42024887676 |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | File created: C:\Users\user\AppData\Roaming\CPaFDuSsVdolxV.exe | Jump to dropped file |
Source: unknown | Process created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CPaFDuSsVdolxV' /XML 'C:\Users\user\AppData\Local\Temp\tmp777C.tmp' |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: Yara match | File source: 00000001.00000002.222727824.00000000026FB000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: DHL_document1102202068090891.exe PID: 6268, type: MEMORY |
Source: DHL_document1102202068090891.exe, 00000001.00000002.222727824.00000000026FB000.00000004.00000001.sdmp | Binary or memory string: SBIEDLL.DLL |
Source: DHL_document1102202068090891.exe, 00000001.00000002.222727824.00000000026FB000.00000004.00000001.sdmp | Binary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | File opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Thread delayed: delay time: 922337203685477 | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe TID: 6272 | Thread sleep time: -100620s >= -30000s | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe TID: 6316 | Thread sleep time: -922337203685477s >= -30000s | Jump to behavior |
Source: C:\Windows\System32\conhost.exe | Last function: Thread delayed |
Source: DHL_document1102202068090891.exe, 00000001.00000002.222727824.00000000026FB000.00000004.00000001.sdmp | Binary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\ |
Source: DHL_document1102202068090891.exe, 00000001.00000002.222727824.00000000026FB000.00000004.00000001.sdmp | Binary or memory string: vmware |
Source: DHL_document1102202068090891.exe, 00000001.00000002.222727824.00000000026FB000.00000004.00000001.sdmp | Binary or memory string: VMware SVGA II |
Source: DHL_document1102202068090891.exe, 00000001.00000002.222727824.00000000026FB000.00000004.00000001.sdmp | Binary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process information queried: ProcessInformation | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process token adjusted: Debug | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Memory allocated: page read and write | page guard | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\CPaFDuSsVdolxV' /XML 'C:\Users\user\AppData\Local\Temp\tmp777C.tmp' | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process created: C:\Users\user\Desktop\DHL_document1102202068090891.exe C:\Users\user\Desktop\DHL_document1102202068090891.exe | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process created: C:\Users\user\Desktop\DHL_document1102202068090891.exe C:\Users\user\Desktop\DHL_document1102202068090891.exe | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process created: C:\Users\user\Desktop\DHL_document1102202068090891.exe C:\Users\user\Desktop\DHL_document1102202068090891.exe | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process created: C:\Users\user\Desktop\DHL_document1102202068090891.exe C:\Users\user\Desktop\DHL_document1102202068090891.exe | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Process created: C:\Users\user\Desktop\DHL_document1102202068090891.exe C:\Users\user\Desktop\DHL_document1102202068090891.exe | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Queries volume information: C:\Users\user\Desktop\DHL_document1102202068090891.exe VolumeInformation | Jump to behavior |
Source: C:\Users\user\Desktop\DHL_document1102202068090891.exe | Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid | Jump to behavior |
Source: Yara match | File source: 00000001.00000002.223300212.0000000013EA0000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 1.2.DHL_document1102202068090891.exe.141f00a8.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.DHL_document1102202068090891.exe.141f00a8.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.DHL_document1102202068090891.exe.140d7788.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.DHL_document1102202068090891.exe.14061548.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000001.00000002.223300212.0000000013EA0000.00000004.00000001.sdmp, type: MEMORY |
Source: Yara match | File source: 1.2.DHL_document1102202068090891.exe.141f00a8.3.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.DHL_document1102202068090891.exe.141f00a8.3.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.DHL_document1102202068090891.exe.140d7788.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 1.2.DHL_document1102202068090891.exe.14061548.4.raw.unpack, type: UNPACKEDPE |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.