Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MSystem32.exe

Overview

General Information

Sample name:MSystem32.exe
Analysis ID:1596563
MD5:0b9c6adaad6b250ad72923c2014b44b0
SHA1:7b9f82bef71e2d4ddfc258c2d1b7e7c5f76547fe
SHA256:1a9dc2fbfe2257278e6452872cdbd18c50bf5c7142dd04c772f1633a7f20fd0d
Tags:exeNanocoreRATuser-lontze7
Infos:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected Nanocore RAT
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • MSystem32.exe (PID: 6708 cmdline: "C:\Users\user\Desktop\MSystem32.exe" MD5: 0B9C6ADAAD6B250AD72923C2014B44B0)
    • schtasks.exe (PID: 2632 cmdline: "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5FB6.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 2404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 5172 cmdline: "schtasks.exe" /create /f /tn "DNS Host Task" /xml "C:\Users\user\AppData\Local\Temp\tmp60B1.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 2360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • dw20.exe (PID: 7016 cmdline: dw20.exe -x -s 1524 MD5: 89106D4D0BA99F770EAFE946EA81BB65)
  • MSystem32.exe (PID: 5688 cmdline: C:\Users\user\Desktop\MSystem32.exe 0 MD5: 0B9C6ADAAD6B250AD72923C2014B44B0)
  • dnshost.exe (PID: 5632 cmdline: "C:\Program Files (x86)\DNS Host\dnshost.exe" 0 MD5: 0B9C6ADAAD6B250AD72923C2014B44B0)
  • dnshost.exe (PID: 5352 cmdline: "C:\Program Files (x86)\DNS Host\dnshost.exe" MD5: 0B9C6ADAAD6B250AD72923C2014B44B0)
  • cleanup
{"Version": "1.2.2.0", "Mutex": "27f61c82-a893-4fbd-9acd-5df9ed98", "Group": "CustomRPC", "Domain1": "sulfux.ddns.net", "Domain2": "90.113.178.145", "Port": 9033, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n  <RegistrationInfo />\r\n  <Triggers />\r\n  <Principals>\r\n    <Principal id=\"Author\">\r\n      <LogonType>InteractiveToken</LogonType>\r\n      <RunLevel>HighestAvailable</RunLevel>\r\n    </Principal>\r\n  </Principals>\r\n  <Settings>\r\n    <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n    <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n    <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n    <AllowHardTerminate>true</AllowHardTerminate>\r\n    <StartWhenAvailable>false</StartWhenAvailable>\r\n    <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n    <IdleSettings>\r\n      <StopOnIdleEnd>false</StopOnIdleEnd>\r\n      <RestartOnIdle>false</RestartOnIdle>\r\n    </IdleSettings>\r\n    <AllowStartOnDemand>true</AllowStartOnDemand>\r\n    <Enabled>true</Enabled>\r\n    <Hidden>false</Hidden>\r\n    <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n    <WakeToRun>false</WakeToRun>\r\n    <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n    <Priority>4</Priority>\r\n  </Settings>\r\n  <Actions Context=\"Author\">\r\n    <Exec>\r\n      <Command>\"#EXECUTABLEPATH\"</Command>\r\n      <Arguments>$(Arg0)</Arguments>\r\n    </Exec>\r\n  </Actions>\r\n</Task"}
SourceRuleDescriptionAuthorStrings
MSystem32.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    MSystem32.exeWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0x1018d:$a1: NanoCore.ClientPluginHost
    • 0x1014d:$a2: NanoCore.ClientPlugin
    • 0x120a6:$b1: get_BuilderSettings
    • 0xffa9:$b2: ClientLoaderForm.resources
    • 0x117c6:$b3: PluginCommand
    • 0x1017e:$b4: IClientAppHost
    • 0x1a5fe:$b5: GetBlockHash
    • 0x126fe:$b6: AddHostEntry
    • 0x163f1:$b7: LogClientException
    • 0x1266b:$b8: PipeExists
    • 0x101b7:$b9: IClientLoggingHost
    MSystem32.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfef5:$a: NanoCore
    • 0xff05:$a: NanoCore
    • 0x10139:$a: NanoCore
    • 0x1014d:$a: NanoCore
    • 0x1018d:$a: NanoCore
    • 0xff54:$b: ClientPlugin
    • 0x10156:$b: ClientPlugin
    • 0x10196:$b: ClientPlugin
    • 0x1007b:$c: ProjectData
    • 0x10a82:$d: DESCrypto
    • 0x1844e:$e: KeepAlive
    • 0x1643c:$g: LogClientMessage
    • 0x12637:$i: get_Connected
    • 0x10db8:$j: #=q
    • 0x10de8:$j: #=q
    • 0x10e04:$j: #=q
    • 0x10e34:$j: #=q
    • 0x10e50:$j: #=q
    • 0x10e6c:$j: #=q
    • 0x10e9c:$j: #=q
    • 0x10eb8:$j: #=q
    MSystem32.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1018d:$x1: NanoCore.ClientPluginHost
    • 0x101ca:$x2: IClientNetworkHost
    • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    MSystem32.exeNanocoredetect Nanocore in memoryJPCERT/CC Incident Response Group
    • 0xfef5:$v1: NanoCore Client
    • 0xff05:$v1: NanoCore Client
    • 0x117c6:$v2: PluginCommand
    • 0x117ae:$v3: CommandType
    Click to see the 1 entries
    SourceRuleDescriptionAuthorStrings
    C:\Program Files (x86)\DNS Host\dnshost.exeJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      C:\Program Files (x86)\DNS Host\dnshost.exeWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
      • 0x1018d:$a1: NanoCore.ClientPluginHost
      • 0x1014d:$a2: NanoCore.ClientPlugin
      • 0x120a6:$b1: get_BuilderSettings
      • 0xffa9:$b2: ClientLoaderForm.resources
      • 0x117c6:$b3: PluginCommand
      • 0x1017e:$b4: IClientAppHost
      • 0x1a5fe:$b5: GetBlockHash
      • 0x126fe:$b6: AddHostEntry
      • 0x163f1:$b7: LogClientException
      • 0x1266b:$b8: PipeExists
      • 0x101b7:$b9: IClientLoggingHost
      C:\Program Files (x86)\DNS Host\dnshost.exeNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0xfef5:$a: NanoCore
      • 0xff05:$a: NanoCore
      • 0x10139:$a: NanoCore
      • 0x1014d:$a: NanoCore
      • 0x1018d:$a: NanoCore
      • 0xff54:$b: ClientPlugin
      • 0x10156:$b: ClientPlugin
      • 0x10196:$b: ClientPlugin
      • 0x1007b:$c: ProjectData
      • 0x10a82:$d: DESCrypto
      • 0x1844e:$e: KeepAlive
      • 0x1643c:$g: LogClientMessage
      • 0x12637:$i: get_Connected
      • 0x10db8:$j: #=q
      • 0x10de8:$j: #=q
      • 0x10e04:$j: #=q
      • 0x10e34:$j: #=q
      • 0x10e50:$j: #=q
      • 0x10e6c:$j: #=q
      • 0x10e9c:$j: #=q
      • 0x10eb8:$j: #=q
      C:\Program Files (x86)\DNS Host\dnshost.exeNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      C:\Program Files (x86)\DNS Host\dnshost.exeNanocoredetect Nanocore in memoryJPCERT/CC Incident Response Group
      • 0xfef5:$v1: NanoCore Client
      • 0xff05:$v1: NanoCore Client
      • 0x117c6:$v2: PluginCommand
      • 0x117ae:$v3: CommandType
      Click to see the 1 entries
      SourceRuleDescriptionAuthorStrings
      00000006.00000002.2302298443.0000000004001000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        00000006.00000002.2302298443.0000000004001000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
        • 0x49b23:$a1: NanoCore.ClientPluginHost
        • 0x5d291:$a1: NanoCore.ClientPluginHost
        • 0x7627d:$a1: NanoCore.ClientPluginHost
        • 0x49ae6:$a2: NanoCore.ClientPlugin
        • 0x5d25c:$a2: NanoCore.ClientPlugin
        • 0x76248:$a2: NanoCore.ClientPlugin
        • 0x49eba:$b1: get_BuilderSettings
        • 0x621d7:$b1: get_BuilderSettings
        • 0x7b1c3:$b1: get_BuilderSettings
        • 0x49b71:$b4: IClientAppHost
        • 0x49f2b:$b6: AddHostEntry
        • 0x49f9a:$b7: LogClientException
        • 0x62146:$b7: LogClientException
        • 0x7b132:$b7: LogClientException
        • 0x49f0f:$b8: PipeExists
        • 0x49b5e:$b9: IClientLoggingHost
        • 0x5d2ab:$b9: IClientLoggingHost
        • 0x76297:$b9: IClientLoggingHost
        00000006.00000002.2302298443.0000000004001000.00000004.00000800.00020000.00000000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
        • 0x49a8d:$a: NanoCore
        • 0x49ae6:$a: NanoCore
        • 0x49b23:$a: NanoCore
        • 0x49b9c:$a: NanoCore
        • 0x5d247:$a: NanoCore
        • 0x5d25c:$a: NanoCore
        • 0x5d291:$a: NanoCore
        • 0x76233:$a: NanoCore
        • 0x76248:$a: NanoCore
        • 0x7627d:$a: NanoCore
        • 0x49aef:$b: ClientPlugin
        • 0x49b2c:$b: ClientPlugin
        • 0x4a42a:$b: ClientPlugin
        • 0x4a437:$b: ClientPlugin
        • 0x5d003:$b: ClientPlugin
        • 0x5d01e:$b: ClientPlugin
        • 0x5d04e:$b: ClientPlugin
        • 0x5d265:$b: ClientPlugin
        • 0x5d29a:$b: ClientPlugin
        • 0x75fef:$b: ClientPlugin
        • 0x7600a:$b: ClientPlugin
        00000000.00000002.3193422405.0000000005C90000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          00000000.00000002.3193422405.0000000005C90000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
          • 0xf7ad:$a1: NanoCore.ClientPluginHost
          • 0xf778:$a2: NanoCore.ClientPlugin
          • 0x146f3:$b1: get_BuilderSettings
          • 0x14662:$b7: LogClientException
          • 0xf7c7:$b9: IClientLoggingHost
          Click to see the 28 entries
          SourceRuleDescriptionAuthorStrings
          0.2.MSystem32.exe.5a00000.3.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
          • 0xe75:$a1: NanoCore.ClientPluginHost
          • 0xe38:$a2: NanoCore.ClientPlugin
          • 0x120c:$b1: get_BuilderSettings
          • 0xec3:$b4: IClientAppHost
          • 0x127d:$b6: AddHostEntry
          • 0x12ec:$b7: LogClientException
          • 0x1261:$b8: PipeExists
          • 0xeb0:$b9: IClientLoggingHost
          0.2.MSystem32.exe.5a00000.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0xe75:$x1: NanoCore.ClientPluginHost
          • 0xe8f:$x2: IClientNetworkHost
          0.2.MSystem32.exe.5a00000.3.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
          • 0xe38:$x2: NanoCore.ClientPlugin
          • 0xe75:$x3: NanoCore.ClientPluginHost
          • 0xe5a:$i1: IClientApp
          • 0xe4e:$i2: IClientData
          • 0xe29:$i3: IClientNetwork
          • 0xec3:$i4: IClientAppHost
          • 0xe65:$i5: IClientDataHost
          • 0xeb0:$i6: IClientLoggingHost
          • 0xe8f:$i7: IClientNetworkHost
          • 0xea2:$i8: IClientUIHost
          • 0xed2:$i9: IClientNameObjectCollection
          • 0xef7:$i10: IClientReadOnlyNameObjectCollection
          • 0xe41:$s1: ClientPlugin
          • 0x177c:$s1: ClientPlugin
          • 0x1789:$s1: ClientPlugin
          • 0x11f9:$s6: get_ClientSettings
          • 0x1249:$s7: get_Connected
          0.2.MSystem32.exe.5c90000.4.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
            0.2.MSystem32.exe.5c90000.4.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
            • 0xf7ad:$a1: NanoCore.ClientPluginHost
            • 0xf778:$a2: NanoCore.ClientPlugin
            • 0x146f3:$b1: get_BuilderSettings
            • 0x14662:$b7: LogClientException
            • 0xf7c7:$b9: IClientLoggingHost
            Click to see the 42 entries

            AV Detection

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\MSystem32.exe, ProcessId: 6708, TargetFilename: C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat

            E-Banking Fraud

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\MSystem32.exe, ProcessId: 6708, TargetFilename: C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5FB6.tmp", CommandLine: "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5FB6.tmp", CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\MSystem32.exe", ParentImage: C:\Users\user\Desktop\MSystem32.exe, ParentProcessId: 6708, ParentProcessName: MSystem32.exe, ProcessCommandLine: "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5FB6.tmp", ProcessId: 2632, ProcessName: schtasks.exe
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Program Files (x86)\DNS Host\dnshost.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\MSystem32.exe, ProcessId: 6708, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DNS Host

            Persistence and Installation Behavior

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5FB6.tmp", CommandLine: "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5FB6.tmp", CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\MSystem32.exe", ParentImage: C:\Users\user\Desktop\MSystem32.exe, ParentProcessId: 6708, ParentProcessName: MSystem32.exe, ProcessCommandLine: "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5FB6.tmp", ProcessId: 2632, ProcessName: schtasks.exe

            Stealing of Sensitive Information

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\MSystem32.exe, ProcessId: 6708, TargetFilename: C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat

            Remote Access Functionality

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\MSystem32.exe, ProcessId: 6708, TargetFilename: C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-22T06:57:07.940201+010020469141Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:08.064794+010020469141Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:08.127336+010020469141Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:08.252221+010020469141Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:08.377222+010020469141Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:08.515442+010020469141Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:08.585268+010020469141Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:08.716442+010020469141Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:08.830332+010020469141Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:13.076818+010020469141Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:13.233859+010020469141Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:13.361546+010020469141Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:13.424270+010020469141Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:13.549238+010020469141Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:13.674102+010020469141Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:13.799163+010020469141Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:13.869144+010020469141Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:14.002767+010020469141Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:14.127355+010020469141Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:14.252306+010020469141Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:14.314712+010020469141Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:14.439753+010020469141Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:14.564722+010020469141Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:14.689836+010020469141Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:14.752281+010020469141Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:18.939774+010020469141Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.064815+010020469141Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.189911+010020469141Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.332464+010020469141Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.396301+010020469141Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.517911+010020469141Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.643096+010020469141Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.767971+010020469141Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.830565+010020469141Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.955618+010020469141Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:20.080383+010020469141Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:20.205789+010020469141Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:20.268208+010020469141Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:20.393181+010020469141Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:20.518744+010020469141Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:20.643057+010020469141Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:24.816035+010020469141Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:24.877355+010020469141Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.002245+010020469141Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.127236+010020469141Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.252855+010020469141Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.377223+010020469141Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.439726+010020469141Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.564794+010020469141Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.689865+010020469141Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.815080+010020469141Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.888510+010020469141Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:26.006676+010020469141Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:26.127241+010020469141Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:26.189737+010020469141Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:26.314996+010020469141Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:26.439813+010020469141Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:26.564783+010020469141Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:30.705504+010020469141Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:30.830426+010020469141Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:30.955852+010020469141Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.080783+010020469141Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.142819+010020469141Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.267878+010020469141Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.393057+010020469141Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.455469+010020469141Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.580341+010020469141Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.709472+010020469141Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.830751+010020469141Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.956197+010020469141Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:32.021199+010020469141Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:32.159234+010020469141Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:32.288900+010020469141Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:32.509128+010020469141Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:36.627277+010020469141Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:36.752277+010020469141Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:36.814762+010020469141Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:36.941334+010020469141Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.064744+010020469141Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.190769+010020469141Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.252413+010020469141Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.377605+010020469141Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.502393+010020469141Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.627365+010020469141Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.752261+010020469141Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.814850+010020469141Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.947865+010020469141Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:38.081334+010020469141Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:38.145358+010020469141Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:38.304196+010020469141Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:38.566637+010020469141Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:42.846118+010020469141Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:42.908600+010020469141Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.033516+010020469141Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.158507+010020469141Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.283505+010020469141Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.345990+010020469141Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.471233+010020469141Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.596038+010020469141Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.721019+010020469141Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.846132+010020469141Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.908698+010020469141Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:44.034296+010020469141Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:44.158649+010020469141Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:44.283622+010020469141Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:44.408526+010020469141Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:44.483290+010020469141Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:48.674072+010020469141Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:48.799168+010020469141Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:48.861709+010020469141Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:48.986754+010020469141Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.112144+010020469141Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.237036+010020469141Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.299128+010020469141Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.424114+010020469141Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.549247+010020469141Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.612246+010020469141Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.745873+010020469141Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.878847+010020469141Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.939854+010020469141Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:50.084143+010020469141Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:50.262019+010020469141Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:50.359678+010020469141Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:50.441201+010020469141Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:54.627358+010020469141Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:54.736734+010020469141Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:54.846038+010020469141Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:54.908661+010020469141Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.018192+010020469141Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.127422+010020469141Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.237469+010020469141Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.283933+010020469141Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.395219+010020469141Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.502347+010020469141Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.565037+010020469141Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.674242+010020469141Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.784195+010020469141Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.938982+010020469141Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.994355+010020469141Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:56.132125+010020469141Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:58:00.252216+010020469141Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.371634+010020469141Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.424350+010020469141Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.470998+010020469141Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.565231+010020469141Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.658580+010020469141Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.718300+010020469141Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.815004+010020469141Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.861598+010020469141Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.964570+010020469141Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:01.036449+010020469141Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:01.334395+010020469141Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:01.378083+010020469141Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:01.473464+010020469141Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:01.580603+010020469141Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:01.627385+010020469141Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:01.721257+010020469141Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:05.851263+010020469141Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:05.895216+010020469141Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:05.955450+010020469141Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.033688+010020469141Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.080603+010020469141Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.158683+010020469141Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.190474+010020469141Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.268185+010020469141Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.315001+010020469141Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.377730+010020469141Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.471339+010020469141Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.502752+010020469141Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.580714+010020469141Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.643232+010020469141Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.705541+010020469141Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.752415+010020469141Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:10.846187+010020469141Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:10.877360+010020469141Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:10.940020+010020469141Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:10.971078+010020469141Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.033695+010020469141Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.080483+010020469141Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.111659+010020469141Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.174424+010020469141Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.205402+010020469141Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.236875+010020469141Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.299326+010020469141Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.330597+010020469141Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.393148+010020469141Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.424340+010020469141Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.486904+010020469141Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.518100+010020469141Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:15.616368+010020469141Malware Command and Control Activity Detected192.168.2.65001790.113.179.939033TCP
            2025-01-22T06:58:19.678582+010020469141Malware Command and Control Activity Detected192.168.2.65001890.113.179.939033TCP
            2025-01-22T06:58:19.690031+010020469141Malware Command and Control Activity Detected192.168.2.65001890.113.179.939033TCP
            2025-01-22T06:58:23.752840+010020469141Malware Command and Control Activity Detected192.168.2.65001990.113.179.939033TCP
            2025-01-22T06:58:23.771266+010020469141Malware Command and Control Activity Detected192.168.2.65001990.113.179.939033TCP
            2025-01-22T06:58:27.817660+010020469141Malware Command and Control Activity Detected192.168.2.65002090.113.178.1459033TCP
            2025-01-22T06:58:27.833579+010020469141Malware Command and Control Activity Detected192.168.2.65002090.113.178.1459033TCP
            2025-01-22T06:58:32.007943+010020469141Malware Command and Control Activity Detected192.168.2.65002290.113.178.1459033TCP
            2025-01-22T06:58:32.126411+010020469141Malware Command and Control Activity Detected192.168.2.65002290.113.178.1459033TCP
            2025-01-22T06:58:32.155475+010020469141Malware Command and Control Activity Detected192.168.2.65002290.113.178.1459033TCP
            2025-01-22T06:58:32.191453+010020469141Malware Command and Control Activity Detected192.168.2.65002290.113.178.1459033TCP
            2025-01-22T06:58:32.207978+010020469141Malware Command and Control Activity Detected192.168.2.65002290.113.178.1459033TCP
            2025-01-22T06:58:32.223023+010020469141Malware Command and Control Activity Detected192.168.2.65002290.113.178.1459033TCP
            2025-01-22T06:58:32.259337+010020469141Malware Command and Control Activity Detected192.168.2.65002290.113.178.1459033TCP
            2025-01-22T06:58:36.302070+010020469141Malware Command and Control Activity Detected192.168.2.65002590.113.178.1459033TCP
            2025-01-22T06:58:36.315252+010020469141Malware Command and Control Activity Detected192.168.2.65002590.113.178.1459033TCP
            2025-01-22T06:58:36.330601+010020469141Malware Command and Control Activity Detected192.168.2.65002590.113.178.1459033TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-22T06:57:07.940201+010028223261Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:08.064794+010028223261Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:08.127336+010028223261Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:08.252221+010028223261Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:08.377222+010028223261Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:08.515442+010028223261Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:08.585268+010028223261Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:08.716442+010028223261Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:08.830332+010028223261Malware Command and Control Activity Detected192.168.2.64973990.113.179.939033TCP
            2025-01-22T06:57:13.076818+010028223261Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:13.233859+010028223261Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:13.361546+010028223261Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:13.424270+010028223261Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:13.549238+010028223261Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:13.674102+010028223261Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:13.799163+010028223261Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:13.869144+010028223261Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:14.002767+010028223261Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:14.127355+010028223261Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:14.252306+010028223261Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:14.314712+010028223261Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:14.439753+010028223261Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:14.564722+010028223261Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:14.689836+010028223261Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:14.752281+010028223261Malware Command and Control Activity Detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:57:18.939774+010028223261Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.064815+010028223261Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.189911+010028223261Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.332464+010028223261Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.396301+010028223261Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.517911+010028223261Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.643096+010028223261Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.767971+010028223261Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.830565+010028223261Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:19.955618+010028223261Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:20.080383+010028223261Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:20.205789+010028223261Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:20.268208+010028223261Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:20.393181+010028223261Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:20.518744+010028223261Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:20.643057+010028223261Malware Command and Control Activity Detected192.168.2.64981890.113.179.939033TCP
            2025-01-22T06:57:24.816035+010028223261Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:24.877355+010028223261Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.002245+010028223261Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.127236+010028223261Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.252855+010028223261Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.377223+010028223261Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.439726+010028223261Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.564794+010028223261Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.689865+010028223261Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.815080+010028223261Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:25.888510+010028223261Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:26.006676+010028223261Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:26.127241+010028223261Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:26.189737+010028223261Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:26.314996+010028223261Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:26.439813+010028223261Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:26.564783+010028223261Malware Command and Control Activity Detected192.168.2.64985990.113.178.1459033TCP
            2025-01-22T06:57:30.705504+010028223261Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:30.830426+010028223261Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:30.955852+010028223261Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.080783+010028223261Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.142819+010028223261Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.267878+010028223261Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.393057+010028223261Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.455469+010028223261Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.580341+010028223261Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.709472+010028223261Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.830751+010028223261Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:31.956197+010028223261Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:32.021199+010028223261Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:32.159234+010028223261Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:32.288900+010028223261Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:32.509128+010028223261Malware Command and Control Activity Detected192.168.2.64990590.113.178.1459033TCP
            2025-01-22T06:57:36.627277+010028223261Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:36.752277+010028223261Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:36.814762+010028223261Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:36.941334+010028223261Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.064744+010028223261Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.190769+010028223261Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.252413+010028223261Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.377605+010028223261Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.502393+010028223261Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.627365+010028223261Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.752261+010028223261Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.814850+010028223261Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:37.947865+010028223261Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:38.081334+010028223261Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:38.145358+010028223261Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:38.304196+010028223261Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:38.566637+010028223261Malware Command and Control Activity Detected192.168.2.64995290.113.178.1459033TCP
            2025-01-22T06:57:42.846118+010028223261Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:42.908600+010028223261Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.033516+010028223261Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.158507+010028223261Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.283505+010028223261Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.345990+010028223261Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.471233+010028223261Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.596038+010028223261Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.721019+010028223261Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.846132+010028223261Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:43.908698+010028223261Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:44.034296+010028223261Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:44.158649+010028223261Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:44.283622+010028223261Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:44.408526+010028223261Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:44.483290+010028223261Malware Command and Control Activity Detected192.168.2.64999390.113.179.939033TCP
            2025-01-22T06:57:48.674072+010028223261Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:48.799168+010028223261Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:48.861709+010028223261Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:48.986754+010028223261Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.112144+010028223261Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.237036+010028223261Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.299128+010028223261Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.424114+010028223261Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.549247+010028223261Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.612246+010028223261Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.745873+010028223261Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.878847+010028223261Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:49.939854+010028223261Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:50.084143+010028223261Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:50.262019+010028223261Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:50.359678+010028223261Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:50.441201+010028223261Malware Command and Control Activity Detected192.168.2.65000990.113.179.939033TCP
            2025-01-22T06:57:54.627358+010028223261Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:54.736734+010028223261Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:54.846038+010028223261Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:54.908661+010028223261Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.018192+010028223261Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.127422+010028223261Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.237469+010028223261Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.283933+010028223261Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.395219+010028223261Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.502347+010028223261Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.565037+010028223261Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.674242+010028223261Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.784195+010028223261Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.938982+010028223261Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:55.994355+010028223261Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:57:56.132125+010028223261Malware Command and Control Activity Detected192.168.2.65001090.113.179.939033TCP
            2025-01-22T06:58:00.252216+010028223261Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.371634+010028223261Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.424350+010028223261Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.470998+010028223261Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.565231+010028223261Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.658580+010028223261Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.718300+010028223261Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.815004+010028223261Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.861598+010028223261Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:00.964570+010028223261Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:01.036449+010028223261Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:01.334395+010028223261Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:01.378083+010028223261Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:01.473464+010028223261Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:01.580603+010028223261Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:01.627385+010028223261Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:01.721257+010028223261Malware Command and Control Activity Detected192.168.2.65001490.113.178.1459033TCP
            2025-01-22T06:58:05.851263+010028223261Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:05.895216+010028223261Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:05.955450+010028223261Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.033688+010028223261Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.080603+010028223261Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.158683+010028223261Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.190474+010028223261Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.268185+010028223261Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.315001+010028223261Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.377730+010028223261Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.471339+010028223261Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.502752+010028223261Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.580714+010028223261Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.643232+010028223261Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.705541+010028223261Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:06.752415+010028223261Malware Command and Control Activity Detected192.168.2.65001590.113.178.1459033TCP
            2025-01-22T06:58:10.846187+010028223261Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:10.877360+010028223261Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:10.940020+010028223261Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:10.971078+010028223261Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.033695+010028223261Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.080483+010028223261Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.111659+010028223261Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.174424+010028223261Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.205402+010028223261Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.236875+010028223261Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.299326+010028223261Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.330597+010028223261Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.393148+010028223261Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.424340+010028223261Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.486904+010028223261Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:11.518100+010028223261Malware Command and Control Activity Detected192.168.2.65001690.113.178.1459033TCP
            2025-01-22T06:58:15.616368+010028223261Malware Command and Control Activity Detected192.168.2.65001790.113.179.939033TCP
            2025-01-22T06:58:19.678582+010028223261Malware Command and Control Activity Detected192.168.2.65001890.113.179.939033TCP
            2025-01-22T06:58:19.690031+010028223261Malware Command and Control Activity Detected192.168.2.65001890.113.179.939033TCP
            2025-01-22T06:58:23.752840+010028223261Malware Command and Control Activity Detected192.168.2.65001990.113.179.939033TCP
            2025-01-22T06:58:23.771266+010028223261Malware Command and Control Activity Detected192.168.2.65001990.113.179.939033TCP
            2025-01-22T06:58:27.817660+010028223261Malware Command and Control Activity Detected192.168.2.65002090.113.178.1459033TCP
            2025-01-22T06:58:27.833579+010028223261Malware Command and Control Activity Detected192.168.2.65002090.113.178.1459033TCP
            2025-01-22T06:58:32.007943+010028223261Malware Command and Control Activity Detected192.168.2.65002290.113.178.1459033TCP
            2025-01-22T06:58:32.126411+010028223261Malware Command and Control Activity Detected192.168.2.65002290.113.178.1459033TCP
            2025-01-22T06:58:32.155475+010028223261Malware Command and Control Activity Detected192.168.2.65002290.113.178.1459033TCP
            2025-01-22T06:58:32.191453+010028223261Malware Command and Control Activity Detected192.168.2.65002290.113.178.1459033TCP
            2025-01-22T06:58:32.207978+010028223261Malware Command and Control Activity Detected192.168.2.65002290.113.178.1459033TCP
            2025-01-22T06:58:32.223023+010028223261Malware Command and Control Activity Detected192.168.2.65002290.113.178.1459033TCP
            2025-01-22T06:58:32.259337+010028223261Malware Command and Control Activity Detected192.168.2.65002290.113.178.1459033TCP
            2025-01-22T06:58:36.302070+010028223261Malware Command and Control Activity Detected192.168.2.65002590.113.178.1459033TCP
            2025-01-22T06:58:36.315252+010028223261Malware Command and Control Activity Detected192.168.2.65002590.113.178.1459033TCP
            2025-01-22T06:58:36.330601+010028223261Malware Command and Control Activity Detected192.168.2.65002590.113.178.1459033TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-22T06:57:13.076818+010028167181A Network Trojan was detected192.168.2.64978090.113.179.939033TCP
            2025-01-22T06:58:23.752840+010028167181A Network Trojan was detected192.168.2.65001990.113.179.939033TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: MSystem32.exeAvira: detected
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen7
            Source: 00000006.00000002.2302298443.0000000004001000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "27f61c82-a893-4fbd-9acd-5df9ed98", "Group": "CustomRPC", "Domain1": "sulfux.ddns.net", "Domain2": "90.113.178.145", "Port": 9033, "KeyboardLogging": "Enable", "RunOnStartup": "Enable", "RequestElevation": "Disable", "BypassUAC": "Enable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4", "BypassUserAccountControlData": "<?xml version=\"1.0\" encoding=\"UTF-16\"?>\r\n<Task version=\"1.2\" xmlns=\"http://schemas.microsoft.com/windows/2004/02/mit/task\">\r\n <RegistrationInfo />\r\n <Triggers />\r\n <Principals>\r\n <Principal id=\"Author\">\r\n <LogonType>InteractiveToken</LogonType>\r\n <RunLevel>HighestAvailable</RunLevel>\r\n </Principal>\r\n </Principals>\r\n <Settings>\r\n <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>\r\n <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>\r\n <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>\r\n <AllowHardTerminate>true</AllowHardTerminate>\r\n <StartWhenAvailable>false</StartWhenAvailable>\r\n <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>\r\n <IdleSettings>\r\n <StopOnIdleEnd>false</StopOnIdleEnd>\r\n <RestartOnIdle>false</RestartOnIdle>\r\n </IdleSettings>\r\n <AllowStartOnDemand>true</AllowStartOnDemand>\r\n <Enabled>true</Enabled>\r\n <Hidden>false</Hidden>\r\n <RunOnlyIfIdle>false</RunOnlyIfIdle>\r\n <WakeToRun>false</WakeToRun>\r\n <ExecutionTimeLimit>PT0S</ExecutionTimeLimit>\r\n <Priority>4</Priority>\r\n </Settings>\r\n <Actions Context=\"Author\">\r\n <Exec>\r\n <Command>\"#EXECUTABLEPATH\"</Command>\r\n <Arguments>$(Arg0)</Arguments>\r\n </Exec>\r\n </Actions>\r\n</Task"}
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeReversingLabs: Detection: 97%
            Source: MSystem32.exeReversingLabs: Detection: 97%
            Source: MSystem32.exeVirustotal: Detection: 88%Perma Link
            Source: Yara matchFile source: MSystem32.exe, type: SAMPLE
            Source: Yara matchFile source: 0.2.MSystem32.exe.5c90000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MSystem32.exe.5c94629.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.MSystem32.exe.404eae4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MSystem32.exe.5c90000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.MSystem32.exe.405310d.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.MSystem32.exe.404eae4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.MSystem32.exe.950000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.MSystem32.exe.4049cae.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.2302298443.0000000004001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3193422405.0000000005C90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.2220370877.0000000000952000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2303284587.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2302209097.0000000003001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: MSystem32.exe PID: 6708, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MSystem32.exe PID: 5688, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 5632, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\DNS Host\dnshost.exe, type: DROPPED
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeJoe Sandbox ML: detected
            Source: MSystem32.exeJoe Sandbox ML: detected
            Source: MSystem32.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\MSystem32.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:49739 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:49739 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:49780 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2816718 - Severity 1 - ETPRO MALWARE NanoCore RAT Keep-Alive Beacon : 192.168.2.6:49780 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:49780 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:49818 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:49818 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:49859 -> 90.113.178.145:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:49859 -> 90.113.178.145:9033
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:49905 -> 90.113.178.145:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:49905 -> 90.113.178.145:9033
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:49952 -> 90.113.178.145:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:49952 -> 90.113.178.145:9033
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:49993 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:49993 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:50010 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:50014 -> 90.113.178.145:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:50014 -> 90.113.178.145:9033
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:50016 -> 90.113.178.145:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:50010 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:50017 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:50017 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:50018 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:50020 -> 90.113.178.145:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:50020 -> 90.113.178.145:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:50016 -> 90.113.178.145:9033
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:50022 -> 90.113.178.145:9033
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:50019 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:50018 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:50015 -> 90.113.178.145:9033
            Source: Network trafficSuricata IDS: 2816718 - Severity 1 - ETPRO MALWARE NanoCore RAT Keep-Alive Beacon : 192.168.2.6:50019 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:50022 -> 90.113.178.145:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:50019 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:50015 -> 90.113.178.145:9033
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:50009 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:50009 -> 90.113.179.93:9033
            Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.6:50025 -> 90.113.178.145:9033
            Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.6:50025 -> 90.113.178.145:9033
            Source: Malware configuration extractorURLs: sulfux.ddns.net
            Source: Malware configuration extractorURLs: 90.113.178.145
            Source: unknownDNS query: name: sulfux.ddns.net
            Source: global trafficTCP traffic: 192.168.2.6:49739 -> 90.113.179.93:9033
            Source: global trafficTCP traffic: 192.168.2.6:49859 -> 90.113.178.145:9033
            Source: Joe Sandbox ViewASN Name: FranceTelecom-OrangeFR FranceTelecom-OrangeFR
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: unknownTCP traffic detected without corresponding DNS query: 90.113.178.145
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_05322D56 WSARecv,0_2_05322D56
            Source: global trafficDNS traffic detected: DNS query: sulfux.ddns.net
            Source: Amcache.hve.18.drString found in binary or memory: http://upx.sf.net
            Source: MSystem32.exe, 00000000.00000002.3193422405.0000000005C90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevicesmemstr_4273dc7c-f

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: MSystem32.exe, type: SAMPLE
            Source: Yara matchFile source: 0.2.MSystem32.exe.5c90000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MSystem32.exe.5c94629.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.MSystem32.exe.404eae4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MSystem32.exe.5c90000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.MSystem32.exe.405310d.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.MSystem32.exe.404eae4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.MSystem32.exe.950000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.MSystem32.exe.4049cae.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.2302298443.0000000004001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3193422405.0000000005C90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.2220370877.0000000000952000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2303284587.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2302209097.0000000003001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: MSystem32.exe PID: 6708, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MSystem32.exe PID: 5688, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 5632, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\DNS Host\dnshost.exe, type: DROPPED

            System Summary

            barindex
            Source: MSystem32.exe, type: SAMPLEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: MSystem32.exe, type: SAMPLEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: MSystem32.exe, type: SAMPLEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: MSystem32.exe, type: SAMPLEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
            Source: MSystem32.exe, type: SAMPLEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.MSystem32.exe.5a00000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0.2.MSystem32.exe.5a00000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.MSystem32.exe.5a00000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.MSystem32.exe.5c90000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0.2.MSystem32.exe.5c90000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.MSystem32.exe.5c90000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.MSystem32.exe.5c94629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0.2.MSystem32.exe.5c94629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.MSystem32.exe.5c94629.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 7.2.dnshost.exe.2dc0d88.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 7.2.dnshost.exe.2dc0d88.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 7.2.dnshost.exe.2dc0d88.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 6.2.MSystem32.exe.404eae4.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 6.2.MSystem32.exe.404eae4.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 6.2.MSystem32.exe.404eae4.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.MSystem32.exe.5c90000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0.2.MSystem32.exe.5c90000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.MSystem32.exe.5c90000.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 6.2.MSystem32.exe.405310d.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 6.2.MSystem32.exe.405310d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 6.2.MSystem32.exe.405310d.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 6.2.MSystem32.exe.3040cb0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 6.2.MSystem32.exe.3040cb0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 6.2.MSystem32.exe.3040cb0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 6.2.MSystem32.exe.404eae4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 6.2.MSystem32.exe.404eae4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 6.2.MSystem32.exe.404eae4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.0.MSystem32.exe.950000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0.0.MSystem32.exe.950000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.0.MSystem32.exe.950000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.0.MSystem32.exe.950000.0.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
            Source: 0.0.MSystem32.exe.950000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 6.2.MSystem32.exe.4049cae.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 6.2.MSystem32.exe.4049cae.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 6.2.MSystem32.exe.4049cae.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 6.2.MSystem32.exe.4049cae.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 0.2.MSystem32.exe.2fc9634.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 0.2.MSystem32.exe.2fc9634.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 0.2.MSystem32.exe.2fc9634.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
            Source: 00000006.00000002.2302298443.0000000004001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 00000006.00000002.2302298443.0000000004001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000002.3193422405.0000000005C90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 00000000.00000002.3193422405.0000000005C90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000000.00000002.3193422405.0000000005C90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
            Source: 00000000.00000000.2220370877.0000000000952000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 00000000.00000000.2220370877.0000000000952000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000000.2220370877.0000000000952000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000000.00000000.2220370877.0000000000952000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
            Source: 00000007.00000002.2303284587.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 00000007.00000002.2303284587.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000002.3192183909.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 00000000.00000002.3192183909.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: 00000000.00000002.3192183909.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
            Source: 00000006.00000002.2302209097.0000000003001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: 00000006.00000002.2302209097.0000000003001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000002.3187385566.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: Process Memory Space: MSystem32.exe PID: 6708, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: Process Memory Space: MSystem32.exe PID: 6708, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: MSystem32.exe PID: 6708, type: MEMORYSTRMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: Process Memory Space: MSystem32.exe PID: 6708, type: MEMORYSTRMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
            Source: Process Memory Space: MSystem32.exe PID: 5688, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: Process Memory Space: MSystem32.exe PID: 5688, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: Process Memory Space: dnshost.exe PID: 5632, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: Process Memory Space: dnshost.exe PID: 5632, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: C:\Program Files (x86)\DNS Host\dnshost.exe, type: DROPPEDMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
            Source: C:\Program Files (x86)\DNS Host\dnshost.exe, type: DROPPEDMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
            Source: C:\Program Files (x86)\DNS Host\dnshost.exe, type: DROPPEDMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
            Source: C:\Program Files (x86)\DNS Host\dnshost.exe, type: DROPPEDMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Program Files (x86)\DNS Host\dnshost.exe, type: DROPPEDMatched rule: Detects NanoCore Author: ditekSHen
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_053232A2 NtQuerySystemInformation,0_2_053232A2
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_05323267 NtQuerySystemInformation,0_2_05323267
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_051589880_2_05158988
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_051538500_2_05153850
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_0515B0980_2_0515B098
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_051523A00_2_051523A0
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_05152FA80_2_05152FA8
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_051595880_2_05159588
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_0515306F0_2_0515306F
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_0515964F0_2_0515964F
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 6_2_051D38506_2_051D3850
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 6_2_051D2FA86_2_051D2FA8
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 6_2_051D23A06_2_051D23A0
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 6_2_051D306F6_2_051D306F
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 7_2_011E2FA87_2_011E2FA8
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 7_2_011E23A07_2_011E23A0
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 7_2_011E306F7_2_011E306F
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 8_2_00E223A08_2_00E223A0
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 8_2_00E22FA88_2_00E22FA8
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 8_2_00E238508_2_00E23850
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 8_2_00E2306F8_2_00E2306F
            Source: C:\Users\user\Desktop\MSystem32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1524
            Source: MSystem32.exe, 00000000.00000002.3185244614.0000000000D5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs MSystem32.exe
            Source: MSystem32.exe, 00000000.00000002.3193422405.0000000005C90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs MSystem32.exe
            Source: MSystem32.exe, 00000000.00000002.3193422405.0000000005C90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs MSystem32.exe
            Source: MSystem32.exe, 00000000.00000002.3188885400.0000000004030000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs MSystem32.exe
            Source: MSystem32.exe, 00000000.00000002.3193526870.0000000005CB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs MSystem32.exe
            Source: MSystem32.exe, 00000000.00000002.3192183909.0000000005A00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs MSystem32.exe
            Source: MSystem32.exe, 00000000.00000002.3187385566.0000000002FB1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs MSystem32.exe
            Source: MSystem32.exe, 00000000.00000002.3188885400.0000000004017000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs MSystem32.exe
            Source: MSystem32.exe, 00000006.00000002.2301866265.0000000001098000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs MSystem32.exe
            Source: MSystem32.exe, 00000006.00000002.2302298443.0000000004001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs MSystem32.exe
            Source: MSystem32.exe, 00000006.00000002.2302298443.0000000004001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs MSystem32.exe
            Source: MSystem32.exe, 00000006.00000002.2302298443.0000000004001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs MSystem32.exe
            Source: MSystem32.exe, 00000006.00000002.2302209097.0000000003001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs MSystem32.exe
            Source: MSystem32.exe, 00000006.00000002.2302209097.0000000003001000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs MSystem32.exe
            Source: MSystem32.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: MSystem32.exe, type: SAMPLEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: MSystem32.exe, type: SAMPLEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: MSystem32.exe, type: SAMPLEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: MSystem32.exe, type: SAMPLEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
            Source: MSystem32.exe, type: SAMPLEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.MSystem32.exe.5a00000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0.2.MSystem32.exe.5a00000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.MSystem32.exe.5a00000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.MSystem32.exe.5c90000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0.2.MSystem32.exe.5c90000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.MSystem32.exe.5c90000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.MSystem32.exe.5c94629.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0.2.MSystem32.exe.5c94629.5.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.MSystem32.exe.5c94629.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 7.2.dnshost.exe.2dc0d88.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 7.2.dnshost.exe.2dc0d88.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 7.2.dnshost.exe.2dc0d88.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 6.2.MSystem32.exe.404eae4.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 6.2.MSystem32.exe.404eae4.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 6.2.MSystem32.exe.404eae4.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.MSystem32.exe.5c90000.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0.2.MSystem32.exe.5c90000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.MSystem32.exe.5c90000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 6.2.MSystem32.exe.405310d.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 6.2.MSystem32.exe.405310d.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 6.2.MSystem32.exe.405310d.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 6.2.MSystem32.exe.3040cb0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 6.2.MSystem32.exe.3040cb0.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 6.2.MSystem32.exe.3040cb0.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 6.2.MSystem32.exe.404eae4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 6.2.MSystem32.exe.404eae4.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 6.2.MSystem32.exe.404eae4.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.0.MSystem32.exe.950000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0.0.MSystem32.exe.950000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 0.0.MSystem32.exe.950000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.0.MSystem32.exe.950000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
            Source: 0.0.MSystem32.exe.950000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 6.2.MSystem32.exe.4049cae.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 6.2.MSystem32.exe.4049cae.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 6.2.MSystem32.exe.4049cae.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 6.2.MSystem32.exe.4049cae.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 0.2.MSystem32.exe.2fc9634.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 0.2.MSystem32.exe.2fc9634.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 0.2.MSystem32.exe.2fc9634.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 00000006.00000002.2302298443.0000000004001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 00000006.00000002.2302298443.0000000004001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000000.00000002.3193422405.0000000005C90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 00000000.00000002.3193422405.0000000005C90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000000.00000002.3193422405.0000000005C90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 00000000.00000000.2220370877.0000000000952000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 00000000.00000000.2220370877.0000000000952000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000000.00000000.2220370877.0000000000952000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000000.00000000.2220370877.0000000000952000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
            Source: 00000007.00000002.2303284587.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 00000007.00000002.2303284587.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000000.00000002.3192183909.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 00000000.00000002.3192183909.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: 00000000.00000002.3192183909.0000000005A00000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: 00000006.00000002.2302209097.0000000003001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: 00000006.00000002.2302209097.0000000003001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: 00000000.00000002.3187385566.0000000002FB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: Process Memory Space: MSystem32.exe PID: 6708, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: Process Memory Space: MSystem32.exe PID: 6708, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: MSystem32.exe PID: 6708, type: MEMORYSTRMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: Process Memory Space: MSystem32.exe PID: 6708, type: MEMORYSTRMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
            Source: Process Memory Space: MSystem32.exe PID: 5688, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: Process Memory Space: MSystem32.exe PID: 5688, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: Process Memory Space: dnshost.exe PID: 5632, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: Process Memory Space: dnshost.exe PID: 5632, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: C:\Program Files (x86)\DNS Host\dnshost.exe, type: DROPPEDMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
            Source: C:\Program Files (x86)\DNS Host\dnshost.exe, type: DROPPEDMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
            Source: C:\Program Files (x86)\DNS Host\dnshost.exe, type: DROPPEDMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
            Source: C:\Program Files (x86)\DNS Host\dnshost.exe, type: DROPPEDMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
            Source: C:\Program Files (x86)\DNS Host\dnshost.exe, type: DROPPEDMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
            Source: MSystem32.exe, --qVxXNKnhAcArgJoGGYXiyyQ--.csCryptographic APIs: 'TransformFinalBlock'
            Source: MSystem32.exe, --qVxXNKnhAcArgJoGGYXiyyQ--.csCryptographic APIs: 'TransformFinalBlock'
            Source: MSystem32.exe, --qjIje6jGWLd2EOkfZXKqBbg--.csCryptographic APIs: 'TransformFinalBlock'
            Source: dnshost.exe.0.dr, --qVxXNKnhAcArgJoGGYXiyyQ--.csCryptographic APIs: 'TransformFinalBlock'
            Source: dnshost.exe.0.dr, --qVxXNKnhAcArgJoGGYXiyyQ--.csCryptographic APIs: 'TransformFinalBlock'
            Source: dnshost.exe.0.dr, --qjIje6jGWLd2EOkfZXKqBbg--.csCryptographic APIs: 'TransformFinalBlock'
            Source: MSystem32.exe, --qjIje6jGWLd2EOkfZXKqBbg--.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: MSystem32.exe, --qjIje6jGWLd2EOkfZXKqBbg--.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: dnshost.exe.0.dr, --qjIje6jGWLd2EOkfZXKqBbg--.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: dnshost.exe.0.dr, --qjIje6jGWLd2EOkfZXKqBbg--.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: classification engineClassification label: mal100.troj.evad.winEXE@12/12@9/2
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_05323062 AdjustTokenPrivileges,0_2_05323062
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_0532302B AdjustTokenPrivileges,0_2_0532302B
            Source: C:\Users\user\Desktop\MSystem32.exeFile created: C:\Program Files (x86)\DNS HostJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeFile created: C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06Jump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeMutant created: NULL
            Source: C:\Users\user\Desktop\MSystem32.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2404:120:WilError_03
            Source: C:\Users\user\Desktop\MSystem32.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{27f61c82-a893-4fbd-9acd-5df9ed98d52d}
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2360:120:WilError_03
            Source: C:\Users\user\Desktop\MSystem32.exeFile created: C:\Users\user\AppData\Local\Temp\tmp5FB6.tmpJump to behavior
            Source: MSystem32.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: MSystem32.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\MSystem32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: MSystem32.exeReversingLabs: Detection: 97%
            Source: MSystem32.exeVirustotal: Detection: 88%
            Source: C:\Users\user\Desktop\MSystem32.exeFile read: C:\Users\user\Desktop\MSystem32.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\MSystem32.exe "C:\Users\user\Desktop\MSystem32.exe"
            Source: C:\Users\user\Desktop\MSystem32.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5FB6.tmp"
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\MSystem32.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DNS Host Task" /xml "C:\Users\user\AppData\Local\Temp\tmp60B1.tmp"
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\Desktop\MSystem32.exe C:\Users\user\Desktop\MSystem32.exe 0
            Source: unknownProcess created: C:\Program Files (x86)\DNS Host\dnshost.exe "C:\Program Files (x86)\DNS Host\dnshost.exe" 0
            Source: unknownProcess created: C:\Program Files (x86)\DNS Host\dnshost.exe "C:\Program Files (x86)\DNS Host\dnshost.exe"
            Source: C:\Users\user\Desktop\MSystem32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1524
            Source: C:\Users\user\Desktop\MSystem32.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5FB6.tmp"Jump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DNS Host Task" /xml "C:\Users\user\AppData\Local\Temp\tmp60B1.tmp"Jump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1524Jump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
            Source: MSystem32.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: C:\Users\user\Desktop\MSystem32.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior

            Data Obfuscation

            barindex
            Source: MSystem32.exe, --qjIje6jGWLd2EOkfZXKqBbg--.cs.Net Code: _0023_003Dqf3c4WtE_0024_0024thN5QyBMvo3u0lth2VF5hmfUsIv1r8yRkg_003D System.Reflection.Assembly.Load(byte[])
            Source: MSystem32.exe, --qjIje6jGWLd2EOkfZXKqBbg--.cs.Net Code: _0023_003Dq_FL69pQf17BUSAFbWYu1SStMAbdu_0024R1GJ8VY8UL5_EA_003D System.Reflection.Assembly.Load(byte[])
            Source: MSystem32.exe, --qxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecU-.cs.Net Code: _0023_003DqKU0J1fiP8KA33eFK1owekQ_003D_003D System.Reflection.Assembly.Load(byte[])
            Source: dnshost.exe.0.dr, --qjIje6jGWLd2EOkfZXKqBbg--.cs.Net Code: _0023_003Dqf3c4WtE_0024_0024thN5QyBMvo3u0lth2VF5hmfUsIv1r8yRkg_003D System.Reflection.Assembly.Load(byte[])
            Source: dnshost.exe.0.dr, --qjIje6jGWLd2EOkfZXKqBbg--.cs.Net Code: _0023_003Dq_FL69pQf17BUSAFbWYu1SStMAbdu_0024R1GJ8VY8UL5_EA_003D System.Reflection.Assembly.Load(byte[])
            Source: dnshost.exe.0.dr, --qxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecU-.cs.Net Code: _0023_003DqKU0J1fiP8KA33eFK1owekQ_003D_003D System.Reflection.Assembly.Load(byte[])
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_01120E97 push ecx; iretd 0_2_01120F0D
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_01120CA7 pushad ; iretd 0_2_01120CE5
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_0112026D push ds; iretd 0_2_011204C4
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_01299DAC push eax; retf 0_2_01299DAD
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_01299DB0 pushad ; retf 0_2_01299DB1
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_0129771D push es; ret 0_2_01297720
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeCode function: 7_2_011E0280 push 28010026h; iretd 7_2_011E028D
            Source: C:\Users\user\Desktop\MSystem32.exeFile created: C:\Program Files (x86)\DNS Host\dnshost.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\MSystem32.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5FB6.tmp"
            Source: C:\Users\user\Desktop\MSystem32.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run DNS HostJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run DNS HostJump to behavior

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Users\user\Desktop\MSystem32.exeFile opened: C:\Users\user\Desktop\MSystem32.exe:Zone.Identifier read attributes | deleteJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeMemory allocated: 1320000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeMemory allocated: 2FB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeMemory allocated: 4FB0000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeMemory allocated: 1070000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeMemory allocated: 3000000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeMemory allocated: 5000000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: FB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 2D80000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 1330000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: C00000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 2950000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeMemory allocated: 4950000 memory commit | memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeWindow / User API: threadDelayed 1484Jump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeWindow / User API: threadDelayed 6006Jump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeWindow / User API: foregroundWindowGot 1636Jump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exe TID: 5640Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exe TID: 5332Thread sleep time: -742000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exe TID: 1052Thread sleep time: -120000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exe TID: 5332Thread sleep time: -3003000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exe TID: 2544Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exe TID: 2996Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exe TID: 1048Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_0532169A GetSystemInfo,0_2_0532169A
            Source: C:\Users\user\Desktop\MSystem32.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\DNS Host\dnshost.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: Amcache.hve.18.drBinary or memory string: VMware
            Source: Amcache.hve.18.drBinary or memory string: VMware Virtual USB Mouse
            Source: Amcache.hve.18.drBinary or memory string: vmci.syshbin
            Source: Amcache.hve.18.drBinary or memory string: VMware, Inc.
            Source: Amcache.hve.18.drBinary or memory string: VMware20,1hbin@
            Source: Amcache.hve.18.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
            Source: Amcache.hve.18.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.18.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.18.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
            Source: dw20.exe, 00000012.00000002.3186798816.0000000000822000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Amcache.hve.18.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: dw20.exe, 00000012.00000002.3186798816.0000000000822000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBn
            Source: Amcache.hve.18.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
            Source: dw20.exe, 00000012.00000002.3186798816.00000000007B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
            Source: Amcache.hve.18.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
            Source: Amcache.hve.18.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
            Source: Amcache.hve.18.drBinary or memory string: vmci.sys
            Source: Amcache.hve.18.drBinary or memory string: vmci.syshbin`
            Source: Amcache.hve.18.drBinary or memory string: \driver\vmci,\driver\pci
            Source: Amcache.hve.18.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
            Source: Amcache.hve.18.drBinary or memory string: VMware20,1
            Source: Amcache.hve.18.drBinary or memory string: Microsoft Hyper-V Generation Counter
            Source: Amcache.hve.18.drBinary or memory string: NECVMWar VMware SATA CD00
            Source: Amcache.hve.18.drBinary or memory string: VMware Virtual disk SCSI Disk Device
            Source: Amcache.hve.18.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
            Source: Amcache.hve.18.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
            Source: Amcache.hve.18.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
            Source: Amcache.hve.18.drBinary or memory string: VMware PCI VMCI Bus Device
            Source: Amcache.hve.18.drBinary or memory string: VMware VMCI Bus Device
            Source: Amcache.hve.18.drBinary or memory string: VMware Virtual RAM
            Source: Amcache.hve.18.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
            Source: MSystem32.exe, 00000000.00000002.3185244614.0000000000DD3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll>
            Source: Amcache.hve.18.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
            Source: C:\Users\user\Desktop\MSystem32.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DNS Host" /xml "C:\Users\user\AppData\Local\Temp\tmp5FB6.tmp"Jump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks.exe" /create /f /tn "DNS Host Task" /xml "C:\Users\user\AppData\Local\Temp\tmp60B1.tmp"Jump to behavior
            Source: C:\Users\user\Desktop\MSystem32.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe dw20.exe -x -s 1524Jump to behavior
            Source: MSystem32.exe, 00000000.00000002.3187385566.00000000031EC000.00000004.00000800.00020000.00000000.sdmp, MSystem32.exe, 00000000.00000002.3187385566.0000000003168000.00000004.00000800.00020000.00000000.sdmp, MSystem32.exe, 00000000.00000002.3187385566.00000000030BC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: MSystem32.exe, 00000000.00000002.3187385566.0000000003264000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager4
            Source: C:\Users\user\Desktop\MSystem32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: Amcache.hve.18.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
            Source: Amcache.hve.18.drBinary or memory string: msmpeng.exe
            Source: Amcache.hve.18.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
            Source: Amcache.hve.18.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
            Source: Amcache.hve.18.drBinary or memory string: MsMpEng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: MSystem32.exe, type: SAMPLE
            Source: Yara matchFile source: 0.2.MSystem32.exe.5c90000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MSystem32.exe.5c94629.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.MSystem32.exe.404eae4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MSystem32.exe.5c90000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.MSystem32.exe.405310d.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.MSystem32.exe.404eae4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.MSystem32.exe.950000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.MSystem32.exe.4049cae.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.2302298443.0000000004001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3193422405.0000000005C90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.2220370877.0000000000952000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2303284587.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2302209097.0000000003001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: MSystem32.exe PID: 6708, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MSystem32.exe PID: 5688, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 5632, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\DNS Host\dnshost.exe, type: DROPPED

            Remote Access Functionality

            barindex
            Source: MSystem32.exe, 00000000.00000000.2220370877.0000000000952000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: MSystem32.exe, 00000000.00000002.3193422405.0000000005C90000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: MSystem32.exe, 00000000.00000002.3192183909.0000000005A00000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: MSystem32.exe, 00000000.00000002.3192183909.0000000005A00000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: MSystem32.exe, 00000000.00000002.3187385566.0000000002FB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: MSystem32.exe, 00000000.00000002.3187385566.0000000002FB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: MSystem32.exe, 00000006.00000002.2302298443.0000000004001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: MSystem32.exe, 00000006.00000002.2302298443.0000000004001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: MSystem32.exe, 00000006.00000002.2302209097.0000000003001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: MSystem32.exe, 00000006.00000002.2302209097.0000000003001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: dnshost.exe, 00000007.00000002.2303284587.0000000002D81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
            Source: dnshost.exe, 00000007.00000002.2303284587.0000000002D81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
            Source: MSystem32.exeString found in binary or memory: NanoCore.ClientPluginHost
            Source: dnshost.exe.0.drString found in binary or memory: NanoCore.ClientPluginHost
            Source: Yara matchFile source: MSystem32.exe, type: SAMPLE
            Source: Yara matchFile source: 0.2.MSystem32.exe.5c90000.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MSystem32.exe.5c94629.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.MSystem32.exe.404eae4.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MSystem32.exe.5c90000.4.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.MSystem32.exe.405310d.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.MSystem32.exe.404eae4.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.MSystem32.exe.950000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 6.2.MSystem32.exe.4049cae.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000006.00000002.2302298443.0000000004001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3193422405.0000000005C90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.2220370877.0000000000952000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2303284587.0000000002D81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2302209097.0000000003001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: MSystem32.exe PID: 6708, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: MSystem32.exe PID: 5688, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: dnshost.exe PID: 5632, type: MEMORYSTR
            Source: Yara matchFile source: C:\Program Files (x86)\DNS Host\dnshost.exe, type: DROPPED
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_0532289A bind,0_2_0532289A
            Source: C:\Users\user\Desktop\MSystem32.exeCode function: 0_2_05322848 bind,0_2_05322848
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            11
            Input Capture
            13
            System Information Discovery
            Remote Services11
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            1
            Access Token Manipulation
            1
            Deobfuscate/Decode Files or Information
            LSASS Memory111
            Security Software Discovery
            Remote Desktop Protocol11
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt1
            Registry Run Keys / Startup Folder
            12
            Process Injection
            1
            Obfuscated Files or Information
            Security Account Manager2
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            Scheduled Task/Job
            1
            Software Packing
            NTDS31
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput Capture1
            Remote Access Software
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
            Registry Run Keys / Startup Folder
            1
            DLL Side-Loading
            LSA Secrets1
            Application Window Discovery
            SSHKeylogging1
            Non-Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Masquerading
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input Capture21
            Application Layer Protocol
            Data Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
            Virtualization/Sandbox Evasion
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            Access Token Manipulation
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
            Process Injection
            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
            Hidden Files and Directories
            Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1596563 Sample: MSystem32.exe Startdate: 22/01/2025 Architecture: WINDOWS Score: 100 47 Suricata IDS alerts for network traffic 2->47 49 Found malware configuration 2->49 51 Malicious sample detected (through community Yara rule) 2->51 53 14 other signatures 2->53 7 MSystem32.exe 1 14 2->7         started        12 MSystem32.exe 3 2->12         started        14 dnshost.exe 3 2->14         started        16 dnshost.exe 2 2->16         started        process3 dnsIp4 41 sulfux.ddns.net 7->41 43 90.113.178.145, 49859, 49905, 49952 FranceTelecom-OrangeFR France 7->43 45 sulfux.ddns.net 90.113.179.93, 49739, 49780, 49818 FranceTelecom-OrangeFR France 7->45 31 C:\Program Files (x86)\DNS Host\dnshost.exe, PE32 7->31 dropped 33 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 7->33 dropped 35 C:\Users\user\AppData\Local\...\tmp5FB6.tmp, XML 7->35 dropped 37 C:\...\dnshost.exe:Zone.Identifier, ASCII 7->37 dropped 55 Detected Nanocore Rat 7->55 57 Uses schtasks.exe or at.exe to add and modify task schedules 7->57 59 Hides that the sample has been downloaded from the Internet (zone.identifier) 7->59 18 dw20.exe 22 12 7->18         started        21 schtasks.exe 1 7->21         started        23 schtasks.exe 1 7->23         started        39 C:\Users\user\AppData\...\MSystem32.exe.log, ASCII 12->39 dropped file5 61 Uses dynamic DNS services 41->61 signatures6 process7 file8 29 C:\ProgramData\Microsoft\...\Report.wer, Unicode 18->29 dropped 25 conhost.exe 21->25         started        27 conhost.exe 23->27         started        process9

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.