Loading ...

Play interactive tourEdit tour

Analysis Report HMPEX_PO201120112.exe

Overview

General Information

Sample Name:HMPEX_PO201120112.exe
Analysis ID:320997
MD5:466374834392ddb16028e2e90a695e22
SHA1:7bbdf8489efde85fc286a9e1e74d1105fa92e09a
SHA256:413071284c887dc820673640fef4d8c0f3eb4e23db3ef3f3c4b10c4e76b531a8
Tags:exeNanoCoreRAT

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected AntiVM_3
Yara detected Nanocore RAT
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • HMPEX_PO201120112.exe (PID: 7080 cmdline: 'C:\Users\user\Desktop\HMPEX_PO201120112.exe' MD5: 466374834392DDB16028E2E90A695E22)
    • schtasks.exe (PID: 6264 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yaXwsWQOFrzix' /XML 'C:\Users\user\AppData\Local\Temp\tmpB95.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • MSBuild.exe (PID: 6328 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe MD5: 88BBB7610152B48C2B3879473B17857E)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.665594862.0000000002BB5000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000000.00000002.666063227.0000000003B64000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x10f77d:$x1: NanoCore.ClientPluginHost
    • 0x141f9d:$x1: NanoCore.ClientPluginHost
    • 0x10f7ba:$x2: IClientNetworkHost
    • 0x141fda:$x2: IClientNetworkHost
    • 0x1132ed:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x145b0d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000000.00000002.666063227.0000000003B64000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000000.00000002.666063227.0000000003B64000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x10f4e5:$a: NanoCore
      • 0x10f4f5:$a: NanoCore
      • 0x10f729:$a: NanoCore
      • 0x10f73d:$a: NanoCore
      • 0x10f77d:$a: NanoCore
      • 0x141d05:$a: NanoCore
      • 0x141d15:$a: NanoCore
      • 0x141f49:$a: NanoCore
      • 0x141f5d:$a: NanoCore
      • 0x141f9d:$a: NanoCore
      • 0x10f544:$b: ClientPlugin
      • 0x10f746:$b: ClientPlugin
      • 0x10f786:$b: ClientPlugin
      • 0x141d64:$b: ClientPlugin
      • 0x141f66:$b: ClientPlugin
      • 0x141fa6:$b: ClientPlugin
      • 0x10f66b:$c: ProjectData
      • 0x141e8b:$c: ProjectData
      • 0x1cb57d:$c: ProjectData
      • 0x23579d:$c: ProjectData
      • 0x110072:$d: DESCrypto
      00000000.00000002.665529938.0000000002B61000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        Click to see the 4 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 6328, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yaXwsWQOFrzix' /XML 'C:\Users\user\AppData\Local\Temp\tmpB95.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yaXwsWQOFrzix' /XML 'C:\Users\user\AppData\Local\Temp\tmpB95.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\HMPEX_PO201120112.exe' , ParentImage: C:\Users\user\Desktop\HMPEX_PO201120112.exe, ParentProcessId: 7080, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yaXwsWQOFrzix' /XML 'C:\Users\user\AppData\Local\Temp\tmpB95.tmp', ProcessId: 6264

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\yaXwsWQOFrzix.exeReversingLabs: Detection: 25%
        Multi AV Scanner detection for submitted fileShow sources
        Source: HMPEX_PO201120112.exeReversingLabs: Detection: 25%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.666063227.0000000003B64000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: HMPEX_PO201120112.exe PID: 7080, type: MEMORY
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\yaXwsWQOFrzix.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: HMPEX_PO201120112.exeJoe Sandbox ML: detected

        Networking:

        barindex
        Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
        Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.4:49733 -> 185.19.85.136:1120
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: jackpiaau.ddns.net
        Source: global trafficTCP traffic: 192.168.2.4:49733 -> 185.19.85.136:1120
        Source: Joe Sandbox ViewASN Name: DATAWIRE-ASCH DATAWIRE-ASCH
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownTCP traffic detected without corresponding DNS query: 92.122.145.220
        Source: unknownDNS traffic detected: queries for: jackpiaau.ddns.net
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49683
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49682
        Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
        Source: unknownNetwork traffic detected: HTTP traffic on port 49682 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49696
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49693
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49692
        Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49683 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
        Source: HMPEX_PO201120112.exe, 00000000.00000002.664536361.0000000000C9A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.666063227.0000000003B64000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: HMPEX_PO201120112.exe PID: 7080, type: MEMORY

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000000.00000002.666063227.0000000003B64000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.666063227.0000000003B64000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: HMPEX_PO201120112.exe PID: 7080, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: HMPEX_PO201120112.exe PID: 7080, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CC2CD8
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CC147F
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CC3180
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CC0940
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CC36C4
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CC13E8
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CC1CCA
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CC2CC7
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CC48FF
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CC2080
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CCA84F
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CC1040
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CCA860
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CC2071
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CC3170
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CC3118
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CC4910
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CC13D9
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_04CC4B59
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_05270070
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_05270018
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_05276348
        Source: HMPEX_PO201120112.exeBinary or memory string: OriginalFilename vs HMPEX_PO201120112.exe
        Source: HMPEX_PO201120112.exe, 00000000.00000002.668355984.00000000051F0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameKedermister.dllT vs HMPEX_PO201120112.exe
        Source: HMPEX_PO201120112.exe, 00000000.00000002.668742644.0000000005950000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs HMPEX_PO201120112.exe
        Source: HMPEX_PO201120112.exe, 00000000.00000002.663505901.0000000000472000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamesACe.exe4 vs HMPEX_PO201120112.exe
        Source: HMPEX_PO201120112.exe, 00000000.00000002.667611819.0000000004D80000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs HMPEX_PO201120112.exe
        Source: HMPEX_PO201120112.exe, 00000000.00000002.664536361.0000000000C9A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs HMPEX_PO201120112.exe
        Source: HMPEX_PO201120112.exe, 00000000.00000002.668987111.0000000005A50000.00000002.00000001.sdmpBinary or memory string: originalfilename vs HMPEX_PO201120112.exe
        Source: HMPEX_PO201120112.exe, 00000000.00000002.668987111.0000000005A50000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs HMPEX_PO201120112.exe
        Source: HMPEX_PO201120112.exeBinary or memory string: OriginalFilenamesACe.exe4 vs HMPEX_PO201120112.exe
        Source: 00000000.00000002.666063227.0000000003B64000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.666063227.0000000003B64000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: HMPEX_PO201120112.exe PID: 7080, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: HMPEX_PO201120112.exe PID: 7080, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: HMPEX_PO201120112.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: yaXwsWQOFrzix.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: classification engineClassification label: mal100.troj.evad.winEXE@6/8@1/1
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeFile created: C:\Users\user\AppData\Roaming\yaXwsWQOFrzix.exeJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5724:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{fcbfffbd-b172-4cd2-bfe0-e3a14f422e6e}
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeFile created: C:\Users\user\AppData\Local\Temp\tmpB95.tmpJump to behavior
        Source: HMPEX_PO201120112.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: HMPEX_PO201120112.exeReversingLabs: Detection: 25%
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeFile read: C:\Users\user\Desktop\HMPEX_PO201120112.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\HMPEX_PO201120112.exe 'C:\Users\user\Desktop\HMPEX_PO201120112.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yaXwsWQOFrzix' /XML 'C:\Users\user\AppData\Local\Temp\tmpB95.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yaXwsWQOFrzix' /XML 'C:\Users\user\AppData\Local\Temp\tmpB95.tmp'
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: HMPEX_PO201120112.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: HMPEX_PO201120112.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: mscorrc.pdb source: HMPEX_PO201120112.exe, 00000000.00000002.667611819.0000000004D80000.00000002.00000001.sdmp
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_00473365 push esp; retf
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeCode function: 0_2_05270006 push ss; iretd
        Source: initial sampleStatic PE information: section name: .text entropy: 7.65544559702
        Source: initial sampleStatic PE information: section name: .text entropy: 7.65544559702
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeFile created: C:\Users\user\AppData\Roaming\yaXwsWQOFrzix.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yaXwsWQOFrzix' /XML 'C:\Users\user\AppData\Local\Temp\tmpB95.tmp'
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM_3Show sources
        Source: Yara matchFile source: 00000000.00000002.665594862.0000000002BB5000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.665529938.0000000002B61000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: HMPEX_PO201120112.exe PID: 7080, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: HMPEX_PO201120112.exe, 00000000.00000002.665594862.0000000002BB5000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: HMPEX_PO201120112.exe, 00000000.00000002.665594862.0000000002BB5000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: threadDelayed 584
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: threadDelayed 1494
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: foregroundWindowGot 720
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: foregroundWindowGot 661
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exe TID: 7084Thread sleep time: -53674s >= -30000s
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exe TID: 7104Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 4700Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: HMPEX_PO201120112.exe, 00000000.00000002.665594862.0000000002BB5000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: HMPEX_PO201120112.exe, 00000000.00000002.665594862.0000000002BB5000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: HMPEX_PO201120112.exe, 00000000.00000002.665594862.0000000002BB5000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II|update users set password = @password where user_id = @user_id
        Source: HMPEX_PO201120112.exe, 00000000.00000002.664579735.0000000000CCB000.00000004.00000020.sdmpBinary or memory string: \\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#000000001F400000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000026700000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{e6e9dfc6-98f2-11e9-90ce-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: HMPEX_PO201120112.exe, 00000000.00000002.665594862.0000000002BB5000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information queried: ProcessInformation
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Allocates memory in foreign processesShow sources
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 400000 protect: page execute and read and write
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 400000 value starts with: 4D5A
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 400000
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 402000
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 420000
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 422000
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: C9D008
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yaXwsWQOFrzix' /XML 'C:\Users\user\AppData\Local\Temp\tmpB95.tmp'
        Source: C:\Users\user\Desktop\HMPEX_PO201120112.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.666063227.0000000003B64000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: HMPEX_PO201120112.exe PID: 7080, type: MEMORY

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: HMPEX_PO201120112.exe, 00000000.00000002.666063227.0000000003B64000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.666063227.0000000003B64000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: HMPEX_PO201120112.exe PID: 7080, type: MEMORY

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Process Injection311Masquerading1Input Capture1Security Software Discovery221Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/Job1Boot or Logon Initialization ScriptsScheduled Task/Job1Virtualization/Sandbox Evasion3LSASS MemoryVirtualization/Sandbox Evasion3Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection311NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information2LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol12Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing2Cached Domain CredentialsSystem Information Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        HMPEX_PO201120112.exe25%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        HMPEX_PO201120112.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\yaXwsWQOFrzix.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\yaXwsWQOFrzix.exe25%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Unpacked PE Files

        No Antivirus matches

        Domains

        SourceDetectionScannerLabelLink
        jackpiaau.ddns.net4%VirustotalBrowse

        URLs

        No Antivirus matches

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        jackpiaau.ddns.net
        185.19.85.136
        truetrueunknown

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        185.19.85.136
        unknownSwitzerland
        48971DATAWIRE-ASCHtrue

        General Information

        Joe Sandbox Version:31.0.0 Red Diamond
        Analysis ID:320997
        Start date:20.11.2020
        Start time:08:49:24
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 6m 16s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:HMPEX_PO201120112.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:19
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@6/8@1/1
        EGA Information:Failed
        HDC Information:
        • Successful, ratio: 6.2% (good quality ratio 3.9%)
        • Quality average: 36.4%
        • Quality standard deviation: 32.6%
        HCA Information:
        • Successful, ratio: 96%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        Warnings:
        Show All
        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
        • TCP Packets have been reduced to 100
        • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
        • Excluded IPs from analysis (whitelisted): 52.255.188.83, 104.42.151.234, 40.88.32.150, 51.104.139.180, 52.155.217.156, 20.54.26.129, 8.248.113.254, 8.241.9.254, 8.248.121.254, 8.248.115.254, 8.248.131.254, 95.101.22.134, 95.101.22.125
        • Excluded domains from analysis (whitelisted): displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, arc.msn.com.nsatc.net, db3p-ris-pf-prod-atm.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, skypedataprdcoleus15.cloudapp.net, umwatsonrouting.trafficmanager.net, skypedataprdcoleus17.cloudapp.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, skypedataprdcolwus16.cloudapp.net, au-bg-shim.trafficmanager.net
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        08:50:16API Interceptor2x Sleep call for process: HMPEX_PO201120112.exe modified

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        185.19.85.136Unimac_Project_ORDER 10177_R29.exeGet hashmaliciousBrowse
          Y4Taap3cTy.exeGet hashmaliciousBrowse
            JEmT3ndkrV.exeGet hashmaliciousBrowse

              Domains

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              jackpiaau.ddns.netUnimac_Project_ORDER 10177_R29.exeGet hashmaliciousBrowse
              • 185.19.85.136
              Y4Taap3cTy.exeGet hashmaliciousBrowse
              • 185.19.85.136

              ASN

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              DATAWIRE-ASCHMC20200603.exeGet hashmaliciousBrowse
              • 185.19.85.149
              7RP240Rsf3.exeGet hashmaliciousBrowse
              • 185.19.85.183
              MreDJdRXnY.exeGet hashmaliciousBrowse
              • 185.19.85.174
              ev43Rk7dkk.exeGet hashmaliciousBrowse
              • 185.19.85.183
              Unimac_Project_ORDER 10177_R29.exeGet hashmaliciousBrowse
              • 185.19.85.136
              Memorandum of PCR test.exeGet hashmaliciousBrowse
              • 185.19.85.140
              G3GNHu7jej.exeGet hashmaliciousBrowse
              • 185.19.85.183
              Y4Taap3cTy.exeGet hashmaliciousBrowse
              • 185.19.85.136
              88SmCBFWM6.exeGet hashmaliciousBrowse
              • 185.19.85.174
              New specification 2020110003876.exeGet hashmaliciousBrowse
              • 185.19.85.138
              NEW_PURCHASING_ORDER-2020.exeGet hashmaliciousBrowse
              • 185.19.85.183
              Query_Ref_5787533.jsGet hashmaliciousBrowse
              • 185.19.85.169
              PO 456123489.EXEGet hashmaliciousBrowse
              • 185.19.85.149
              PO 4500087588.exeGet hashmaliciousBrowse
              • 185.19.85.149
              PO 478512546.exeGet hashmaliciousBrowse
              • 185.19.85.149
              PO 4500874.exeGet hashmaliciousBrowse
              • 185.19.85.149
              IMG-27102020.exeGet hashmaliciousBrowse
              • 185.19.85.177
              DOC_ECS9522020102615040053_5778_952.exeGet hashmaliciousBrowse
              • 185.19.85.183
              PO-SCAN_DOCUMENTS_00012SW9-JDUD9.exeGet hashmaliciousBrowse
              • 185.19.85.183
              PO_IMG-G7G3D-001HDIE-JJEYE8.exeGet hashmaliciousBrowse
              • 185.19.85.183

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\HMPEX_PO201120112.exe.log
              Process:C:\Users\user\Desktop\HMPEX_PO201120112.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):664
              Entropy (8bit):5.288448637977022
              Encrypted:false
              SSDEEP:12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk70U2xANlW3ANv:MLF20NaL3z2p29hJ5g522rW2xAi3A9
              MD5:B1DB55991C3DA14E35249AEA1BC357CA
              SHA1:0DD2D91198FDEF296441B12F1A906669B279700C
              SHA-256:34D3E48321D5010AD2BD1F3F0B728077E4F5A7F70D66FA36B57E5209580B6BDC
              SHA-512:BE38A31888C9C2F8047FA9C99672CB985179D325107514B7500DDA9523AE3E1D20B45EACC4E6C8A5D096360D0FBB98A120E63F38FFE324DF8A0559F6890CC801
              Malicious:true
              Reputation:moderate, very likely benign file
              Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\35774dc3cd31b4550ab06c3354cf4ba5\System.Runtime.Remoting.ni.dll",0..
              C:\Users\user\AppData\Local\Temp\tmpB95.tmp
              Process:C:\Users\user\Desktop\HMPEX_PO201120112.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1646
              Entropy (8bit):5.189276839355399
              Encrypted:false
              SSDEEP:24:2dH4+SEqC/S7hblNMFp//rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBG4Btn:cbhK79lNQR/rydbz9I3YODOLNdq31T
              MD5:6A01901DB1A09D95B612B3756AE873EB
              SHA1:306D211BCABA87B4775D7AC3E50C8C785AEE2EDB
              SHA-256:5CD2734F46C28BCE65DC53CB22D0883F23092505CBB07D229C13F9ABA4C5C67C
              SHA-512:5A5767CC6B0BE33DE8EA0F74D6F65A8A458EF1556552571C73571D285165A0C218452D96A0A2790D95E585B1F908B44732422D12876F60AAA500C0731BF0225D
              Malicious:true
              Reputation:low
              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
              File Type:data
              Category:dropped
              Size (bytes):232
              Entropy (8bit):7.024371743172393
              Encrypted:false
              SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
              MD5:32D0AAE13696FF7F8AF33B2D22451028
              SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
              SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
              SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
              File Type:Non-ISO extended-ASCII text, with no line terminators
              Category:dropped
              Size (bytes):8
              Entropy (8bit):3.0
              Encrypted:false
              SSDEEP:3:Or:Or
              MD5:F08B37A6FEC6A11BD207F4EC62242C08
              SHA1:C7D52DFE3E5C9CFD74FCBF0C7E78C36530F68F20
              SHA-256:3DA33814894DB347B1E54379EAA7EAC8DD2AF8608BA4D08754910052D29D71CA
              SHA-512:C9F5A50CB3C05365E3E10C9EC678864B3872031C5E4A5DDC7DEAD3F05902713FB90DD0699A7266F37D5CA348D013ACE433B61E1F035D2F4F08B5C552FB1F945D
              Malicious:true
              Reputation:low
              Preview: ..-.(..H
              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
              File Type:data
              Category:dropped
              Size (bytes):40
              Entropy (8bit):5.153055907333276
              Encrypted:false
              SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
              MD5:4E5E92E2369688041CC82EF9650EDED2
              SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
              SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
              SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
              Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
              File Type:data
              Category:dropped
              Size (bytes):426840
              Entropy (8bit):7.999608491116724
              Encrypted:true
              SSDEEP:12288:zKf137EiDsTjevgA4p0V7njXuWSvdVU7V4OC0Rr:+134i2lp67i5d8+OCg
              MD5:963D5E2C9C0008DFF05518B47C367A7F
              SHA1:C183D601FABBC9AC8FBFA0A0937DECC677535E74
              SHA-256:5EACF2974C9BB2C2E24CDC651C4840DD6F4B76A98F0E85E90279F1DBB2E6F3C0
              SHA-512:0C04E1C1A13070D48728D9F7F300D9B26DEC6EC8875D8D3017EAD52B9EE5BDF9B651A7F0FCC537761212831107646ED72B8ED017E7477E600BC0137EF857AE2C
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview: ..g&jo...IPg...GM....R>i...o...I.>.&.r{....8...}...E....v.!7.u3e.. .....db...}.......".t(.xC9.cp.B....7...'.......%......w.^.._.......B.W%.<..i.0.{9.xS...5...)..w..$..C..?`F..u.5.T.X.w'Si..z.n{...Y!m...RA...xg....[7...z..9@.K.-...T..+.ACe....R....enO.....AoNMT.\^....}H&..4I...B.:..@..J...v..rI5..kP......2j....B..B.~.T..>.c..emW;Rn<9..[.r.o....R[....@=...:...L.g<.....I..%4[.G^.~.l'......v.p&.........+..S...9d/.{..H.`@.1..........f.\s...X.a.].<.h*...J4*...k.x....%3.......3.c..?%....>.!.}..)(.{...H...3..`'].Q.[sN..JX(.%pH....+......(...v.....H...3..8.a_..J..?4...y.N(..D.*h..g.jD..I...44Q?..N......oX.A......l...n?./..........$.!..;.^9"H........*...OkF....v.m_.e.v..f...."..bq{.....O.-....%R+...-..P.i..t5....2Z# ...#...,L..{..j..heT -=Z.P;...g.m)<owJ].J..../.p..8.u8.&..#.m9...j%..g&....g.x.I,....u.[....>./W...........*X...b*Z...ex.0..x.}.....Tb...[..H_M._.^N.d&...g._."@4N.pDs].GbT.......&p........Nw...%$=.....{..J.1....2....<E{..<!G..
              C:\Users\user\AppData\Roaming\yaXwsWQOFrzix.exe
              Process:C:\Users\user\Desktop\HMPEX_PO201120112.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):738304
              Entropy (8bit):7.641995912781941
              Encrypted:false
              SSDEEP:12288:qCSdtqM2YwhOTidsW2yL6yftafMUN8TUpErRRbnxvbyDuHWwYW40KpLa6TfkT4T6:uOD8XW2yNafM1TUpu9nZbvX
              MD5:466374834392DDB16028E2E90A695E22
              SHA1:7BBDF8489EFDE85FC286A9E1E74D1105FA92E09A
              SHA-256:413071284C887DC820673640FEF4D8C0F3EB4E23DB3EF3F3C4B10C4E76B531A8
              SHA-512:7D36F338E1D976DA3B3B2FD169BDA797A60E0A4F132313C9083E46FC13DBA674D086FBB6FC49D0D31E4745928E71AC19B9EAE50DB86C0685FB462A025C0E83EB
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 25%
              Reputation:low
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_..............P..............3... ...@....@.. ....................................@.................................`3..K....@...+........................................................................... ............... ..H............text........ ...................... ..`.rsrc....+...@...,..................@..@.reloc...............B..............@..B.................3......H.......hC...............................................................0..........*....0............ W^.. ....a%..^E................+.(....(...... eS.vZ Q...a+......(.....(.... .o.. ....a%..^E................+... '..JZ ...Ha+.*...........?@.......0..*..........(.......(.......( ......(.......(!....*...0..D........ q... ....a%..^E............"...+ .(....o....("..... p]..Z .p_.a+.*.0...........(#...*..0............o$...*.0............(%...*.0............(&....*....0..w.......
              C:\Users\user\AppData\Roaming\yaXwsWQOFrzix.exe:Zone.Identifier
              Process:C:\Users\user\Desktop\HMPEX_PO201120112.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview: [ZoneTransfer]....ZoneId=0

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):7.641995912781941
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
              • Win32 Executable (generic) a (10002005/4) 49.75%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Windows Screen Saver (13104/52) 0.07%
              • Win16/32 Executable Delphi generic (2074/23) 0.01%
              File name:HMPEX_PO201120112.exe
              File size:738304
              MD5:466374834392ddb16028e2e90a695e22
              SHA1:7bbdf8489efde85fc286a9e1e74d1105fa92e09a
              SHA256:413071284c887dc820673640fef4d8c0f3eb4e23db3ef3f3c4b10c4e76b531a8
              SHA512:7d36f338e1d976da3b3b2fd169bda797a60e0a4f132313c9083e46fc13dba674d086fbb6fc49d0d31e4745928e71ac19b9eae50db86c0685fb462a025c0e83eb
              SSDEEP:12288:qCSdtqM2YwhOTidsW2yL6yftafMUN8TUpErRRbnxvbyDuHWwYW40KpLa6TfkT4T6:uOD8XW2yNafM1TUpu9nZbvX
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_..............P..............3... ...@....@.. ....................................@................................

              File Icon

              Icon Hash:d2928ca69a9a8eca

              Static PE Info

              General

              Entrypoint:0x4b33ae
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x5FB6FAB3 [Thu Nov 19 23:07:31 2020 UTC]
              TLS Callbacks:
              CLR (.Net) Version:v2.0.50727
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

              Entrypoint Preview

              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xb33600x4b.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xb40000x2be8.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0xb80000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000xb13b40xb1400False0.805991878967data7.65544559702IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .rsrc0xb40000x2be80x2c00False0.4677734375data5.6739803528IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0xb80000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_ICON0xb41300x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4278255873, next used block 4278255873
              RT_GROUP_ICON0xb66d80x14data
              RT_VERSION0xb66ec0x30cdata
              RT_MANIFEST0xb69f80x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

              Imports

              DLLImport
              mscoree.dll_CorExeMain

              Version Infos

              DescriptionData
              Translation0x0000 0x04b0
              LegalCopyrightCopyright 2014
              Assembly Version1.0.0.0
              InternalNamesACe.exe
              FileVersion1.0.0.0
              CompanyName
              LegalTrademarks
              Comments
              ProductNameBlackjack
              ProductVersion1.0.0.0
              FileDescriptionBlackjack
              OriginalFilenamesACe.exe

              Network Behavior

              Snort IDS Alerts

              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              11/20/20-08:50:22.505556TCP2025019ET TROJAN Possible NanoCore C2 60B497331120192.168.2.4185.19.85.136

              Network Port Distribution

              TCP Packets

              TimestampSource PortDest PortSource IPDest IP
              Nov 20, 2020 08:50:11.001831055 CET49720443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.141361952 CET49726443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.141477108 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.507730961 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.508441925 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.508469105 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.508929968 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.508949041 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.509027004 CET49720443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.509056091 CET49720443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.509871006 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.509893894 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.510016918 CET49720443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.510025978 CET49720443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.510442972 CET4434972692.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.510584116 CET4434972692.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.510838032 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.510941029 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.511008024 CET49720443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.511019945 CET49720443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.511070967 CET4434972692.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.511089087 CET4434972692.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.511105061 CET4434972692.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.511121988 CET4434972692.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.511132956 CET49726443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.511171103 CET49726443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.511219025 CET49726443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.511811018 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.511831045 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.512715101 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.512738943 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.512790918 CET49720443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.512804985 CET49720443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.513200045 CET49720443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.513660908 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.513792038 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.513886929 CET49720443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.513895988 CET49720443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.513922930 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.514647007 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.514671087 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.515113115 CET49720443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.515598059 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.515665054 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.515736103 CET49720443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.515746117 CET49720443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.516122103 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.516141891 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.516217947 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.516488075 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.516508102 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.516519070 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.516551971 CET4434972092.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.516567945 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.517241001 CET49720443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.517349005 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.517369032 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.518062115 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.518229008 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.518249035 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.518320084 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.519023895 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.519052982 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.519119024 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.519179106 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.519833088 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.519855022 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.519943953 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.520629883 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.520651102 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.520742893 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.521475077 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.521502018 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.521564960 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.521619081 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.522284985 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.522305965 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.522388935 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.523123026 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.523144007 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.523225069 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.523957014 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.523977041 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.524049997 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.524787903 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.524811029 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.524883986 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.525593042 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.525613070 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.525706053 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.526433945 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.526456118 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.526529074 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.527266979 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.527290106 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.527375937 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.528116941 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.528136969 CET4434971992.122.145.220192.168.2.4
              Nov 20, 2020 08:50:11.528224945 CET49719443192.168.2.492.122.145.220
              Nov 20, 2020 08:50:11.528911114 CET4434971992.122.145.220192.168.2.4

              UDP Packets

              TimestampSource PortDest PortSource IPDest IP
              Nov 20, 2020 08:50:14.027911901 CET5585453192.168.2.48.8.8.8
              Nov 20, 2020 08:50:14.055264950 CET53558548.8.8.8192.168.2.4
              Nov 20, 2020 08:50:14.841887951 CET6454953192.168.2.48.8.8.8
              Nov 20, 2020 08:50:14.877671957 CET53645498.8.8.8192.168.2.4
              Nov 20, 2020 08:50:15.896670103 CET6315353192.168.2.48.8.8.8
              Nov 20, 2020 08:50:15.923748016 CET53631538.8.8.8192.168.2.4
              Nov 20, 2020 08:50:19.302386999 CET5299153192.168.2.48.8.8.8
              Nov 20, 2020 08:50:19.329267979 CET53529918.8.8.8192.168.2.4
              Nov 20, 2020 08:50:22.055627108 CET5370053192.168.2.48.8.8.8
              Nov 20, 2020 08:50:22.092417955 CET53537008.8.8.8192.168.2.4
              Nov 20, 2020 08:50:31.830106974 CET5172653192.168.2.48.8.8.8
              Nov 20, 2020 08:50:31.865914106 CET53517268.8.8.8192.168.2.4
              Nov 20, 2020 08:50:35.828738928 CET5679453192.168.2.48.8.8.8
              Nov 20, 2020 08:50:35.855731964 CET53567948.8.8.8192.168.2.4
              Nov 20, 2020 08:50:36.439858913 CET5653453192.168.2.48.8.8.8
              Nov 20, 2020 08:50:36.466962099 CET53565348.8.8.8192.168.2.4
              Nov 20, 2020 08:50:37.472125053 CET5662753192.168.2.48.8.8.8
              Nov 20, 2020 08:50:37.499294043 CET53566278.8.8.8192.168.2.4
              Nov 20, 2020 08:50:55.910186052 CET5662153192.168.2.48.8.8.8
              Nov 20, 2020 08:50:55.945593119 CET53566218.8.8.8192.168.2.4
              Nov 20, 2020 08:50:56.387243986 CET6311653192.168.2.48.8.8.8
              Nov 20, 2020 08:50:56.422710896 CET53631168.8.8.8192.168.2.4
              Nov 20, 2020 08:50:56.900177002 CET6407853192.168.2.48.8.8.8
              Nov 20, 2020 08:50:56.935645103 CET53640788.8.8.8192.168.2.4
              Nov 20, 2020 08:50:57.230073929 CET6480153192.168.2.48.8.8.8
              Nov 20, 2020 08:50:57.265727043 CET53648018.8.8.8192.168.2.4
              Nov 20, 2020 08:50:57.587590933 CET6172153192.168.2.48.8.8.8
              Nov 20, 2020 08:50:57.623008966 CET53617218.8.8.8192.168.2.4
              Nov 20, 2020 08:50:58.000662088 CET5125553192.168.2.48.8.8.8
              Nov 20, 2020 08:50:58.013211966 CET6152253192.168.2.48.8.8.8
              Nov 20, 2020 08:50:58.027832985 CET53512558.8.8.8192.168.2.4
              Nov 20, 2020 08:50:58.048953056 CET53615228.8.8.8192.168.2.4
              Nov 20, 2020 08:50:58.493382931 CET5233753192.168.2.48.8.8.8
              Nov 20, 2020 08:50:58.528815031 CET53523378.8.8.8192.168.2.4
              Nov 20, 2020 08:50:59.064446926 CET5504653192.168.2.48.8.8.8
              Nov 20, 2020 08:50:59.099709988 CET53550468.8.8.8192.168.2.4
              Nov 20, 2020 08:50:59.675956964 CET4961253192.168.2.48.8.8.8
              Nov 20, 2020 08:50:59.703383923 CET53496128.8.8.8192.168.2.4
              Nov 20, 2020 08:50:59.715678930 CET4928553192.168.2.48.8.8.8
              Nov 20, 2020 08:50:59.751122952 CET53492858.8.8.8192.168.2.4
              Nov 20, 2020 08:51:00.274235964 CET5060153192.168.2.48.8.8.8
              Nov 20, 2020 08:51:00.309642076 CET53506018.8.8.8192.168.2.4
              Nov 20, 2020 08:51:11.357513905 CET6087553192.168.2.48.8.8.8
              Nov 20, 2020 08:51:11.392838001 CET53608758.8.8.8192.168.2.4
              Nov 20, 2020 08:51:12.155478001 CET5644853192.168.2.48.8.8.8
              Nov 20, 2020 08:51:12.182476044 CET53564488.8.8.8192.168.2.4
              Nov 20, 2020 08:51:12.296574116 CET5917253192.168.2.48.8.8.8
              Nov 20, 2020 08:51:12.323632956 CET53591728.8.8.8192.168.2.4
              Nov 20, 2020 08:51:12.498621941 CET6242053192.168.2.48.8.8.8
              Nov 20, 2020 08:51:12.525890112 CET53624208.8.8.8192.168.2.4
              Nov 20, 2020 08:51:13.670691967 CET6057953192.168.2.48.8.8.8
              Nov 20, 2020 08:51:13.697659969 CET53605798.8.8.8192.168.2.4
              Nov 20, 2020 08:51:14.405373096 CET5018353192.168.2.48.8.8.8
              Nov 20, 2020 08:51:14.432368040 CET53501838.8.8.8192.168.2.4
              Nov 20, 2020 08:51:15.228859901 CET6153153192.168.2.48.8.8.8
              Nov 20, 2020 08:51:15.255908966 CET53615318.8.8.8192.168.2.4
              Nov 20, 2020 08:51:15.595971107 CET4922853192.168.2.48.8.8.8
              Nov 20, 2020 08:51:15.634232998 CET53492288.8.8.8192.168.2.4
              Nov 20, 2020 08:51:33.863043070 CET5979453192.168.2.48.8.8.8
              Nov 20, 2020 08:51:33.890135050 CET53597948.8.8.8192.168.2.4
              Nov 20, 2020 08:51:49.114958048 CET5591653192.168.2.48.8.8.8
              Nov 20, 2020 08:51:49.142155886 CET53559168.8.8.8192.168.2.4
              Nov 20, 2020 08:51:51.060523033 CET5275253192.168.2.48.8.8.8
              Nov 20, 2020 08:51:51.087660074 CET53527528.8.8.8192.168.2.4

              DNS Queries

              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              Nov 20, 2020 08:50:22.055627108 CET192.168.2.48.8.8.80xc9e8Standard query (0)jackpiaau.ddns.netA (IP address)IN (0x0001)

              DNS Answers

              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              Nov 20, 2020 08:50:22.092417955 CET8.8.8.8192.168.2.40xc9e8No error (0)jackpiaau.ddns.net185.19.85.136A (IP address)IN (0x0001)

              Code Manipulations

              Statistics

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:08:50:16
              Start date:20/11/2020
              Path:C:\Users\user\Desktop\HMPEX_PO201120112.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\HMPEX_PO201120112.exe'
              Imagebase:0x470000
              File size:738304 bytes
              MD5 hash:466374834392DDB16028E2E90A695E22
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.665594862.0000000002BB5000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.666063227.0000000003B64000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.666063227.0000000003B64000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.666063227.0000000003B64000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.665529938.0000000002B61000.00000004.00000001.sdmp, Author: Joe Security
              Reputation:low

              General

              Start time:08:50:18
              Start date:20/11/2020
              Path:C:\Windows\SysWOW64\schtasks.exe
              Wow64 process (32bit):true
              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\yaXwsWQOFrzix' /XML 'C:\Users\user\AppData\Local\Temp\tmpB95.tmp'
              Imagebase:0xd00000
              File size:185856 bytes
              MD5 hash:15FF7D8324231381BAD48A052F85DF04
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:08:50:19
              Start date:20/11/2020
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff724c50000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:08:50:19
              Start date:20/11/2020
              Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
              Imagebase:0xaf0000
              File size:69632 bytes
              MD5 hash:88BBB7610152B48C2B3879473B17857E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Reputation:moderate

              Disassembly

              Code Analysis

              Reset < >