Loading ...

Play interactive tourEdit tour

Analysis Report Quotation ATB-PR28500KINH.exe

Overview

General Information

Sample Name:Quotation ATB-PR28500KINH.exe
Analysis ID:321029
MD5:ddb5d5410477cd3855a1f542112808c0
SHA1:5fc06ec885cafa6e8f955651b9e2115b705b2b4d
SHA256:9f76f4b990ce938d48b11501ad00d99795b172b44b1f94ea7ca3a26ceb64c1d5
Tags:exeNanoCorenVpnRAT

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Drops PE files to the startup folder
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Tries to load missing DLLs
Yara signature match

Classification

Startup

  • System is w10x64
  • Quotation ATB-PR28500KINH.exe (PID: 7036 cmdline: 'C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe' MD5: DDB5D5410477CD3855A1F542112808C0)
    • RegAsm.exe (PID: 3392 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe MD5: 6FD7592411112729BF6B1F2F6C34899F)
      • schtasks.exe (PID: 5816 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpAC5D.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • Quotation ATB-PR28500KINH.exe (PID: 6248 cmdline: 'C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe' MD5: DDB5D5410477CD3855A1F542112808C0)
      • RegAsm.exe (PID: 7160 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe MD5: 6FD7592411112729BF6B1F2F6C34899F)
  • RegAsm.exe (PID: 6200 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 0 MD5: 6FD7592411112729BF6B1F2F6C34899F)
    • conhost.exe (PID: 6396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"C2: ": ["185.140.53.139"], "Version: ": "NanoCore Client, Version=1.2.2.0"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000F.00000002.304004800.0000000002D41000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000F.00000002.304004800.0000000002D41000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x6b457:$a: NanoCore
    • 0x6b4b0:$a: NanoCore
    • 0x6b4ed:$a: NanoCore
    • 0x6b566:$a: NanoCore
    • 0x6b4b9:$b: ClientPlugin
    • 0x6b4f6:$b: ClientPlugin
    • 0x6bdf4:$b: ClientPlugin
    • 0x6be01:$b: ClientPlugin
    • 0x615c2:$e: KeepAlive
    • 0x6b941:$g: LogClientMessage
    • 0x6b8c1:$i: get_Connected
    • 0x5b88d:$j: #=q
    • 0x5b8bd:$j: #=q
    • 0x5b8f9:$j: #=q
    • 0x5b921:$j: #=q
    • 0x5b951:$j: #=q
    • 0x5b981:$j: #=q
    • 0x5b9b1:$j: #=q
    • 0x5b9e1:$j: #=q
    • 0x5b9fd:$j: #=q
    • 0x5ba2d:$j: #=q
    00000001.00000002.503999050.00000000040E9000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000001.00000002.503999050.00000000040E9000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x359d:$a: NanoCore
      • 0x35f6:$a: NanoCore
      • 0x3633:$a: NanoCore
      • 0x36ac:$a: NanoCore
      • 0x16d57:$a: NanoCore
      • 0x16d6c:$a: NanoCore
      • 0x16da1:$a: NanoCore
      • 0x2fd33:$a: NanoCore
      • 0x2fd48:$a: NanoCore
      • 0x2fd7d:$a: NanoCore
      • 0x35ff:$b: ClientPlugin
      • 0x363c:$b: ClientPlugin
      • 0x3f3a:$b: ClientPlugin
      • 0x3f47:$b: ClientPlugin
      • 0x16b13:$b: ClientPlugin
      • 0x16b2e:$b: ClientPlugin
      • 0x16b5e:$b: ClientPlugin
      • 0x16d75:$b: ClientPlugin
      • 0x16daa:$b: ClientPlugin
      • 0x2faef:$b: ClientPlugin
      • 0x2fb0a:$b: ClientPlugin
      00000000.00000002.497351250.0000000000B1E000.00000004.00000020.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x4b17d:$x1: NanoCore.ClientPluginHost
      • 0x4b1ba:$x2: IClientNetworkHost
      • 0x4eced:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 42 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      1.2.RegAsm.exe.6670000.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xf7ad:$x1: NanoCore.ClientPluginHost
      • 0xf7da:$x2: IClientNetworkHost
      1.2.RegAsm.exe.6670000.4.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xf7ad:$x2: NanoCore.ClientPluginHost
      • 0x10888:$s4: PipeCreated
      • 0xf7c7:$s5: IClientLoggingHost
      1.2.RegAsm.exe.6670000.4.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        1.2.RegAsm.exe.5aa0000.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        1.2.RegAsm.exe.5aa0000.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe75:$x2: NanoCore.ClientPluginHost
        • 0x1261:$s3: PipeExists
        • 0x1136:$s4: PipeCreated
        • 0xeb0:$s5: IClientLoggingHost
        Click to see the 19 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ProcessId: 3392, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpAC5D.tmp', CommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpAC5D.tmp', CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentProcessId: 3392, ProcessCommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpAC5D.tmp', ProcessId: 5816

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: RegAsm.exe.3392.1.memstrMalware Configuration Extractor: NanoCore {"C2: ": ["185.140.53.139"], "Version: ": "NanoCore Client, Version=1.2.2.0"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\7redfgReversingLabs: Detection: 27%
        Multi AV Scanner detection for submitted fileShow sources
        Source: Quotation ATB-PR28500KINH.exeReversingLabs: Detection: 27%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000F.00000002.304004800.0000000002D41000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.503999050.00000000040E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.497351250.0000000000B1E000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.497878671.0000000001474000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.303385478.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.505763687.0000000005342000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.504002256.0000000004101000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.304067682.0000000003D49000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.515094519.0000000005B42000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.495967274.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.507063640.0000000006670000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.503615613.00000000038A1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7160, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Quotation ATB-PR28500KINH.exe PID: 7036, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3392, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Quotation ATB-PR28500KINH.exe PID: 6248, type: MEMORY
        Source: Yara matchFile source: 1.2.RegAsm.exe.6670000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.RegAsm.exe.6670000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Roaming\7redfgJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: Quotation ATB-PR28500KINH.exeJoe Sandbox ML: detected
        Source: 15.2.RegAsm.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.2.RegAsm.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: global trafficTCP traffic: 192.168.2.7:49725 -> 185.140.53.139:6184
        Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
        Source: unknownDNS traffic detected: queries for: kengeorge.zapto.org
        Source: RegAsm.exe, 00000001.00000002.503999050.00000000040E9000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000F.00000002.304004800.0000000002D41000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.503999050.00000000040E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.497351250.0000000000B1E000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.497878671.0000000001474000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.303385478.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.505763687.0000000005342000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.504002256.0000000004101000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.304067682.0000000003D49000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.515094519.0000000005B42000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.495967274.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.507063640.0000000006670000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.503615613.00000000038A1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7160, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Quotation ATB-PR28500KINH.exe PID: 7036, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3392, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Quotation ATB-PR28500KINH.exe PID: 6248, type: MEMORY
        Source: Yara matchFile source: 1.2.RegAsm.exe.6670000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.RegAsm.exe.6670000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 0000000F.00000002.304004800.0000000002D41000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.503999050.00000000040E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.497351250.0000000000B1E000.00000004.00000020.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.497351250.0000000000B1E000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000002.00000002.497878671.0000000001474000.00000004.00000020.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000002.00000002.497878671.0000000001474000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.506528891.0000000005AA0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000F.00000002.303385478.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000F.00000002.303385478.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.505763687.0000000005342000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.505763687.0000000005342000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000002.00000002.504002256.0000000004101000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000002.00000002.504002256.0000000004101000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000F.00000002.304067682.0000000003D49000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000002.00000002.515094519.0000000005B42000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000002.00000002.515094519.0000000005B42000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.495967274.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000002.495967274.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.507063640.0000000006670000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.503615613.00000000038A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.503615613.00000000038A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: RegAsm.exe PID: 7160, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: RegAsm.exe PID: 7160, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: Quotation ATB-PR28500KINH.exe PID: 7036, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: Quotation ATB-PR28500KINH.exe PID: 7036, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: RegAsm.exe PID: 3392, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: RegAsm.exe PID: 3392, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: Quotation ATB-PR28500KINH.exe PID: 6248, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: Quotation ATB-PR28500KINH.exe PID: 6248, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.RegAsm.exe.6670000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.RegAsm.exe.5aa0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 15.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 15.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.RegAsm.exe.6670000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: Quotation ATB-PR28500KINH.exe
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_05081D7F NtOpenFile,NtCreateFile,NtWriteFile,
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_05081C09 NtDelayExecution,
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_05081C2B NtQueryInformationProcess,NtOpenFile,NtAllocateVirtualMemory,NtReadFile,
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_050800AD NtOpenSection,NtMapViewOfSection,
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_05091C09 CreateProcessW,NtQueryInformationProcess,NtReadVirtualMemory,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtWriteVirtualMemory,NtGetContextThread,NtSetContextThread,NtResumeThread,
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_050900AD NtOpenSection,NtMapViewOfSection,
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_05861D7F NtOpenFile,NtCreateFile,NtWriteFile,
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_058600AD NtOpenSection,NtMapViewOfSection,
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_05861C09 NtDelayExecution,
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_05861C2B NtQueryInformationProcess,NtOpenFile,NtAllocateVirtualMemory,NtReadFile,
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_058800AD NtOpenSection,NtMapViewOfSection,
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_05881C09 CreateProcessW,NtQueryInformationProcess,NtReadVirtualMemory,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtWriteVirtualMemory,NtGetContextThread,NtSetContextThread,NtResumeThread,
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_00586FB9
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_02719620
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_027104F0
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_027104E1
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0172E471
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0172E480
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0172BBD4
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_00D96FB9
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_016104E1
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_016104F0
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_011BE471
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_011BE480
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_011BBBD4
        Source: Quotation ATB-PR28500KINH.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: 7redfg.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: HJdyTuap.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: Quotation ATB-PR28500KINH.exe, 00000000.00000003.459948402.000000000458F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameeCdkqFqNwYfJsCgC.bounce.exe4 vs Quotation ATB-PR28500KINH.exe
        Source: Quotation ATB-PR28500KINH.exe, 00000000.00000002.506982350.0000000006F10000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs Quotation ATB-PR28500KINH.exe
        Source: Quotation ATB-PR28500KINH.exe, 00000000.00000002.507388592.0000000007000000.00000002.00000001.sdmpBinary or memory string: originalfilename vs Quotation ATB-PR28500KINH.exe
        Source: Quotation ATB-PR28500KINH.exe, 00000000.00000002.507388592.0000000007000000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs Quotation ATB-PR28500KINH.exe
        Source: Quotation ATB-PR28500KINH.exe, 00000002.00000002.507553102.0000000004C96000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameeCdkqFqNwYfJsCgC.bounce.exe4 vs Quotation ATB-PR28500KINH.exe
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
        Source: 0000000F.00000002.304004800.0000000002D41000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.503999050.00000000040E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.497351250.0000000000B1E000.00000004.00000020.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.497351250.0000000000B1E000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000002.00000002.497878671.0000000001474000.00000004.00000020.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000002.00000002.497878671.0000000001474000.00000004.00000020.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.506528891.0000000005AA0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.506528891.0000000005AA0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000000F.00000002.303385478.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000F.00000002.303385478.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.505763687.0000000005342000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.505763687.0000000005342000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000002.00000002.504002256.0000000004101000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000002.00000002.504002256.0000000004101000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000F.00000002.304067682.0000000003D49000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000002.00000002.515094519.0000000005B42000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000002.00000002.515094519.0000000005B42000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.495967274.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.495967274.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.507063640.0000000006670000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.507063640.0000000006670000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000000.00000002.503615613.00000000038A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.503615613.00000000038A1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: RegAsm.exe PID: 7160, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: RegAsm.exe PID: 7160, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: Quotation ATB-PR28500KINH.exe PID: 7036, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: Quotation ATB-PR28500KINH.exe PID: 7036, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: RegAsm.exe PID: 3392, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: RegAsm.exe PID: 3392, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: Quotation ATB-PR28500KINH.exe PID: 6248, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: Quotation ATB-PR28500KINH.exe PID: 6248, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.RegAsm.exe.6670000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.RegAsm.exe.6670000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 1.2.RegAsm.exe.5aa0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.RegAsm.exe.5aa0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 15.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 15.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 15.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.RegAsm.exe.6670000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.RegAsm.exe.6670000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Quotation ATB-PR28500KINH.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 7redfg.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: HJdyTuap.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 1.2.RegAsm.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 1.2.RegAsm.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 1.2.RegAsm.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 15.2.RegAsm.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 15.2.RegAsm.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 1.2.RegAsm.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 1.2.RegAsm.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: classification engineClassification label: mal100.troj.adwa.evad.winEXE@12/8@23/1
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeFile created: C:\Users\user\AppData\Roaming\7redfgJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6396:120:WilError_01
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{a69adb5e-9e05-4144-8e58-f506b6f9f16f}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5824:120:WilError_01
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeMutant created: \Sessions\1\BaseNamedObjects\Startup_shellcode_006
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpAC5D.tmpJump to behavior
        Source: Quotation ATB-PR28500KINH.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: Quotation ATB-PR28500KINH.exeReversingLabs: Detection: 27%
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeFile read: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe 'C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe'
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        Source: unknownProcess created: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe 'C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpAC5D.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 0
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess created: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe 'C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe'
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpAC5D.tmp'
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: Quotation ATB-PR28500KINH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: Quotation ATB-PR28500KINH.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.2.RegAsm.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.2.RegAsm.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 15.2.RegAsm.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 15.2.RegAsm.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: HJdyTuap.exe.0.drStatic PE information: real checksum: 0x1015a2 should be: 0x1023a2
        Source: initial sampleStatic PE information: section name: .text entropy: 7.86314578381
        Source: initial sampleStatic PE information: section name: .text entropy: 7.86314578381
        Source: initial sampleStatic PE information: section name: .text entropy: 7.86314578381
        Source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 1.2.RegAsm.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 1.2.RegAsm.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 15.2.RegAsm.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 15.2.RegAsm.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeFile created: C:\Users\user\AppData\Roaming\7redfgJump to dropped file
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exeJump to dropped file
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeFile created: C:\Users\user\AppData\Roaming\7redfgJump to dropped file

        Boot Survival:

        barindex
        Drops PE files to the startup folderShow sources
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exeJump to dropped file
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpAC5D.tmp'
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exeJump to behavior
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exeJump to behavior

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeFile opened: C:\Users\user\AppData\Roaming\7redfg:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeWindow / User API: threadDelayed 408
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeWindow / User API: threadDelayed 2099
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 2801
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 6820
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: foregroundWindowGot 872
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeWindow / User API: threadDelayed 399
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeWindow / User API: threadDelayed 1597
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exeJump to dropped file
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe TID: 7040Thread sleep time: -41980s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6220Thread sleep time: -15679732462653109s >= -30000s
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe TID: 5488Thread sleep count: 399 > 30
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe TID: 4696Thread sleep count: 1597 > 30
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe TID: 4696Thread sleep time: -31940s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6532Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5116Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: RegAsm.exe, 00000001.00000002.507554003.0000000006F10000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: RegAsm.exe, 00000001.00000002.507554003.0000000006F10000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: RegAsm.exe, 00000001.00000002.507554003.0000000006F10000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: RegAsm.exe, 00000001.00000002.497722346.000000000150F000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: RegAsm.exe, 00000001.00000002.507554003.0000000006F10000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_05081D7F mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_05081D7F mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_050801CB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_05081C2B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_050800AD mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_050800AD mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_050900AD mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_050900AD mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 0_2_050901CB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_058601CB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_05861D7F mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_05861D7F mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_058600AD mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_058600AD mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_05861C2B mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_058800AD mov ecx, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_058800AD mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeCode function: 2_2_058801CB mov eax, dword ptr fs:[00000030h]
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess token adjusted: Debug
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Maps a DLL or memory area into another processShow sources
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and write
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and write
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: F12008
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: D96008
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess created: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe 'C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe'
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpAC5D.tmp'
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        Source: Quotation ATB-PR28500KINH.exe, 00000000.00000002.498018854.0000000001220000.00000002.00000001.sdmp, RegAsm.exe, 00000001.00000002.498274600.0000000001940000.00000002.00000001.sdmp, Quotation ATB-PR28500KINH.exe, 00000002.00000002.498789127.0000000001B00000.00000002.00000001.sdmpBinary or memory string: uProgram Manager
        Source: RegAsm.exe, 00000001.00000002.500221210.0000000003286000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: Quotation ATB-PR28500KINH.exe, 00000000.00000002.498018854.0000000001220000.00000002.00000001.sdmp, RegAsm.exe, 00000001.00000002.498274600.0000000001940000.00000002.00000001.sdmp, Quotation ATB-PR28500KINH.exe, 00000002.00000002.498789127.0000000001B00000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: Quotation ATB-PR28500KINH.exe, 00000000.00000002.498018854.0000000001220000.00000002.00000001.sdmp, RegAsm.exe, 00000001.00000002.498274600.0000000001940000.00000002.00000001.sdmp, Quotation ATB-PR28500KINH.exe, 00000002.00000002.498789127.0000000001B00000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: RegAsm.exe, 00000001.00000002.500221210.0000000003286000.00000004.00000001.sdmpBinary or memory string: Program Manager8LI
        Source: Quotation ATB-PR28500KINH.exe, 00000000.00000002.498018854.0000000001220000.00000002.00000001.sdmp, RegAsm.exe, 00000001.00000002.498274600.0000000001940000.00000002.00000001.sdmp, Quotation ATB-PR28500KINH.exe, 00000002.00000002.498789127.0000000001B00000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeQueries volume information: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe VolumeInformation
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeQueries volume information: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe VolumeInformation
        Source: C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000F.00000002.304004800.0000000002D41000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.503999050.00000000040E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.497351250.0000000000B1E000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.497878671.0000000001474000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.303385478.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.505763687.0000000005342000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.504002256.0000000004101000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.304067682.0000000003D49000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.515094519.0000000005B42000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.495967274.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.507063640.0000000006670000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.503615613.00000000038A1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7160, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Quotation ATB-PR28500KINH.exe PID: 7036, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3392, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Quotation ATB-PR28500KINH.exe PID: 6248, type: MEMORY
        Source: Yara matchFile source: 1.2.RegAsm.exe.6670000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.RegAsm.exe.6670000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: Quotation ATB-PR28500KINH.exe, 00000000.00000002.505763687.0000000005342000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegAsm.exe, 00000001.00000002.499194706.00000000030FB000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegAsm.exe, 00000001.00000002.499194706.00000000030FB000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: Quotation ATB-PR28500KINH.exe, 00000002.00000002.504002256.0000000004101000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegAsm.exe, 0000000F.00000002.304004800.0000000002D41000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: RegAsm.exe, 0000000F.00000002.304004800.0000000002D41000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000F.00000002.304004800.0000000002D41000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.503999050.00000000040E9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.497351250.0000000000B1E000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.497878671.0000000001474000.00000004.00000020.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.303385478.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.505763687.0000000005342000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.504002256.0000000004101000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000F.00000002.304067682.0000000003D49000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000002.00000002.515094519.0000000005B42000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.495967274.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.507063640.0000000006670000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.503615613.00000000038A1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7160, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Quotation ATB-PR28500KINH.exe PID: 7036, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3392, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Quotation ATB-PR28500KINH.exe PID: 6248, type: MEMORY
        Source: Yara matchFile source: 1.2.RegAsm.exe.6670000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 15.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.RegAsm.exe.6670000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Startup Items1Startup Items1Masquerading11Input Capture11Security Software Discovery111Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobScheduled Task/Job1Process Injection212Virtualization/Sandbox Evasion3LSASS MemoryVirtualization/Sandbox Evasion3Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Registry Run Keys / Startup Folder12Scheduled Task/Job1Disable or Modify Tools1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)DLL Side-Loading1Registry Run Keys / Startup Folder12Process Injection212NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptDLL Side-Loading1Deobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol1Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)DLL Side-Loading1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 321029 Sample: Quotation ATB-PR28500KINH.exe Startdate: 20/11/2020 Architecture: WINDOWS Score: 100 40 kengeorge.zapto.org 2->40 44 Found malware configuration 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 Multi AV Scanner detection for dropped file 2->48 50 11 other signatures 2->50 9 Quotation ATB-PR28500KINH.exe 4 2->9         started        13 RegAsm.exe 2 2->13         started        signatures3 process4 file5 34 C:\Users\user\AppData\...\HJdyTuap.exe, PE32 9->34 dropped 36 C:\Users\user\AppData\Roaming\7redfg, PE32 9->36 dropped 38 C:\Users\user\...\7redfg:Zone.Identifier, ASCII 9->38 dropped 56 Writes to foreign memory regions 9->56 58 Maps a DLL or memory area into another process 9->58 60 Hides that the sample has been downloaded from the Internet (zone.identifier) 9->60 15 RegAsm.exe 8 9->15         started        19 Quotation ATB-PR28500KINH.exe 9->19         started        22 conhost.exe 13->22         started        signatures6 process7 dnsIp8 42 kengeorge.zapto.org 185.140.53.139, 49725, 49727, 49730 DAVID_CRAIGGG Sweden 15->42 30 C:\Users\user\AppData\Roaming\...\run.dat, data 15->30 dropped 32 C:\Users\user\AppData\Local\...\tmpAC5D.tmp, XML 15->32 dropped 24 schtasks.exe 1 15->24         started        52 Writes to foreign memory regions 19->52 54 Maps a DLL or memory area into another process 19->54 26 RegAsm.exe 2 19->26         started        file9 signatures10 process11 process12 28 conhost.exe 24->28         started       

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        Quotation ATB-PR28500KINH.exe27%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        Quotation ATB-PR28500KINH.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\7redfg100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\7redfg27%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        15.2.RegAsm.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        0.2.Quotation ATB-PR28500KINH.exe.5340000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.2.RegAsm.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        2.2.Quotation ATB-PR28500KINH.exe.5b40000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        No Antivirus matches

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        kengeorge.zapto.org
        185.140.53.139
        truetrue
          unknown

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          185.140.53.139
          unknownSweden
          209623DAVID_CRAIGGGtrue

          General Information

          Joe Sandbox Version:31.0.0 Red Diamond
          Analysis ID:321029
          Start date:20.11.2020
          Start time:09:25:51
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 9m 0s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:Quotation ATB-PR28500KINH.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:27
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.adwa.evad.winEXE@12/8@23/1
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 0.4% (good quality ratio 0.4%)
          • Quality average: 70.5%
          • Quality standard deviation: 17.4%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .exe
          Warnings:
          Show All
          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
          • TCP Packets have been reduced to 100
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
          • Excluded IPs from analysis (whitelisted): 13.64.90.137, 13.88.21.125, 92.122.144.200, 51.104.139.180, 8.248.113.254, 8.253.95.249, 8.241.122.254, 8.248.115.254, 8.248.121.254, 40.67.254.36, 52.155.217.156, 20.54.26.129, 95.101.22.134, 95.101.22.125, 51.11.168.160
          • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, wns.notify.windows.com.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, par02p.wns.notify.windows.com.akadns.net, db5p.wns.notify.windows.com.akadns.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, client.wns.windows.com, fs.microsoft.com, db3p-ris-pf-prod-atm.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, ris.api.iris.microsoft.com, umwatsonrouting.trafficmanager.net, skypedataprdcolwus15.cloudapp.net
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.

          Simulations

          Behavior and APIs

          TimeTypeDescription
          09:26:49AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exe
          09:26:55API Interceptor963x Sleep call for process: RegAsm.exe modified
          09:26:56Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" s>$(Arg0)

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          185.140.53.139Quotation ATB-PR28500KINH.exeGet hashmaliciousBrowse
            RFQ-BOHB-SS-FD6L4.exeGet hashmaliciousBrowse
              PURCHASE_FABRICS_APPAREL_100%_COOTON.exeGet hashmaliciousBrowse
                GT-082568-HSO-280820.DOCX.exeGet hashmaliciousBrowse

                  Domains

                  No context

                  ASN

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  DAVID_CRAIGGGQuotation ATB-PR28500KINH.exeGet hashmaliciousBrowse
                  • 185.140.53.139
                  Ups file de.exeGet hashmaliciousBrowse
                  • 185.140.53.221
                  NyUnwsFSCa.exeGet hashmaliciousBrowse
                  • 185.140.53.149
                  purchase order.exeGet hashmaliciousBrowse
                  • 185.140.53.233
                  Remittance Details.xlsGet hashmaliciousBrowse
                  • 185.140.53.184
                  PaymentConfirmation.exeGet hashmaliciousBrowse
                  • 185.140.53.183
                  ORDER #02676.doc.exeGet hashmaliciousBrowse
                  • 185.244.30.92
                  b11305c6ab207f830062f80eeec728c4.exeGet hashmaliciousBrowse
                  • 185.140.53.233
                  ShippingDoc.jarGet hashmaliciousBrowse
                  • 185.244.30.139
                  1kn1ejwPxi.exeGet hashmaliciousBrowse
                  • 185.140.53.132
                  D6vy84I7rJ.exeGet hashmaliciousBrowse
                  • 185.140.53.149
                  7iatifHQEp.exeGet hashmaliciousBrowse
                  • 185.140.53.132
                  Sbext4ZNBq.exeGet hashmaliciousBrowse
                  • 185.140.53.197
                  xEdiPz1bC3.exeGet hashmaliciousBrowse
                  • 185.140.53.234
                  7D1wvBrRib.exeGet hashmaliciousBrowse
                  • 185.140.53.234
                  O8LDCTOK07.exeGet hashmaliciousBrowse
                  • 185.140.53.233
                  aE78QTkV5H.exeGet hashmaliciousBrowse
                  • 185.244.30.98
                  DHL Shipment Notice of Arrival AWB 8032697940773.jsGet hashmaliciousBrowse
                  • 185.165.153.158
                  ORDER-#00654.doc.....exeGet hashmaliciousBrowse
                  • 185.165.153.116
                  SMJshb9rCD.exeGet hashmaliciousBrowse
                  • 185.140.53.154

                  JA3 Fingerprints

                  No context

                  Dropped Files

                  No context

                  Created / dropped Files

                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):42
                  Entropy (8bit):4.0050635535766075
                  Encrypted:false
                  SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                  MD5:84CFDB4B995B1DBF543B26B86C863ADC
                  SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                  SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                  SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                  C:\Users\user\AppData\Local\Temp\tmpAC5D.tmp
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1319
                  Entropy (8bit):5.134254141338449
                  Encrypted:false
                  SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mxz5xtn:cbk4oL600QydbQxIYODOLedq3Zxz5j
                  MD5:48EF7FA9033389AD7929D7A6B9D10298
                  SHA1:9DB6CB7325C8BDF66A15F7B5F34703709A45AEB6
                  SHA-256:0C1B5F67EEB276D1D4205B138CE32BC6149924E02281A2DB8E4623A700E88F15
                  SHA-512:AC8BD104ECBACC9BCCCE9E087F67E5B18072D59367CCD31D4E66132B6BAAEA520CBA5B9B59464483D86ABF74826B382C402F12E9A586C99BDA8C78A0DE33944E
                  Malicious:true
                  Reputation:moderate, very likely benign file
                  Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                  C:\Users\user\AppData\Roaming\7redfg
                  Process:C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):1020416
                  Entropy (8bit):6.746514435463881
                  Encrypted:false
                  SSDEEP:24576:MbHvzJzELhKXqKNxNTmV3s03o1+pUfOA:MzzJYLhKlpmV3s6o1UUfP
                  MD5:DDB5D5410477CD3855A1F542112808C0
                  SHA1:5FC06EC885CAFA6E8F955651B9E2115B705B2B4D
                  SHA-256:9F76F4B990CE938D48B11501AD00D99795B172B44B1F94EA7CA3A26CEB64C1D5
                  SHA-512:E9C60CC1C03D40C7C45C53FC5A78F1E8B801572A0FDDE422FBF8F80BCC8EEE89C023C48398A15D388275CF6589F6BAAB42E511933ACAD3B3C94CBE4B3D1F819B
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  • Antivirus: ReversingLabs, Detection: 27%
                  Reputation:low
                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....]._................................. ... ....@.. ....................................@.................................D...W.... ..N............................................................................ ............... ..H............text........ ...................... ..`.rsrc...N.... ......................@..@.reloc..............................@..B........................H.......pc..............q..............................................a.b.d.c.e.f.g.h.i.j.k.l.m.n.p.r.q.s.t.u.v.w.z.y.x.0.1.2.3.4.5.6.7.8.9.A.B.C.D.E.F.G.H.I.J.K.L.M.N.Q.P.R.T.S.V.U.W.X.Y.Z.6..(....o....*B...(.....o....&*2.(....t....*.(....&*2.t....o....*F~....~....(.....*..*..(....*.(.........(....(.........(....(....o.........*&...o....*.(....*.(....*.r/..p.....*6..{b...(^...*..o.....{a...{c....{b...oZ...(^...*.so....p...*..oq...*V.{....od....(...+...*J.{....o1....ov...*J
                  C:\Users\user\AppData\Roaming\7redfg:Zone.Identifier
                  Process:C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Reputation:high, very likely benign file
                  Preview: [ZoneTransfer]....ZoneId=0
                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8
                  Entropy (8bit):2.75
                  Encrypted:false
                  SSDEEP:3:tccgt:ttgt
                  MD5:D47A6CEF4DA0DC89FA704BAE78647F81
                  SHA1:E938FA778A75E957E694F7BBE15A8EAA0B0B96EA
                  SHA-256:5C74BB1765AD749D734E7096ABA5C913996CAB20EC42EB3637F8C8DACEA9BDD1
                  SHA-512:4D9E7F9E56C3F7CFB64EEDD5078ECF762FEF4093493ECC54290395EC3DF64453E603537DC57246A819CF7A8A5C5D2E007D7455ACAEB894A3D4C4ABE1048D33B6
                  Malicious:true
                  Reputation:low
                  Preview: K..yy..H
                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):56
                  Entropy (8bit):4.823079645651109
                  Encrypted:false
                  SSDEEP:3:oMty8WddSWAnPL4A:oMLW6WAnPL4A
                  MD5:743A1D76D284D8E42E19061A3F13A723
                  SHA1:D6BBE641CBAC7B46C0922F32DCC89F8F5B87F98C
                  SHA-256:86093BF03032ACFCEF934A0D8363B66AAF4ADEE58015DA0172E13635B1DD1FE8
                  SHA-512:DF687DCD985D1F6127624220083DFD93A39FEBCE02A869F4126787DF3724890ECC10FF18077BFDEF02FCC802440F3F83545E4DA4BD826DC84E59B26A105F6567
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HJdyTuap.exe
                  Process:C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):1024000
                  Entropy (8bit):6.739426849800377
                  Encrypted:false
                  SSDEEP:24576:MbHvzJzELhKXqKNxNTmV3s03o1+pUfOA:MzzJYLhKlpmV3s6o1UUfP
                  MD5:E8989A1CE5543A7E4693DD416A46BE22
                  SHA1:FD0B198079671C3D6C6B01802B9240E8EF80475B
                  SHA-256:676AE550EFF3F5D6E6520604EDD804C606213EB2C5B8B93D449309BEA9B09CC0
                  SHA-512:F3B7F5F8723B3CDAA47D2B1E53B7E96275E3CD9888F37D05D9C654873E3EC434F21140C3E1986FF519EEA5F962C028B0777F10019329C1BC524CAFFA79FD4CCD
                  Malicious:true
                  Antivirus:
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....]._................................. ... ....@.. ....................................@.................................D...W.... ..N............................................................................ ............... ..H............text........ ...................... ..`.rsrc...N.... ......................@..@.reloc..............................@..B........................H.......pc..............q..............................................a.b.d.c.e.f.g.h.i.j.k.l.m.n.p.r.q.s.t.u.v.w.z.y.x.0.1.2.3.4.5.6.7.8.9.A.B.C.D.E.F.G.H.I.J.K.L.M.N.Q.P.R.T.S.V.U.W.X.Y.Z.6..(....o....*B...(.....o....&*2.(....t....*.(....&*2.t....o....*F~....~....(.....*..*..(....*.(.........(....(.........(....(....o.........*&...o....*.(....*.(....*.r/..p.....*6..{b...(^...*..o.....{a...{c....{b...oZ...(^...*.so....p...*..oq...*V.{....od....(...+...*J.{....o1....ov...*J
                  \Device\ConDrv
                  Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):275
                  Entropy (8bit):4.839531074781769
                  Encrypted:false
                  SSDEEP:6:z30qJ5tUI+30qobtUmYRZBXVNYL0dxKaRFfnYJin:z30mc30b4BFNY4xNYU
                  MD5:1B648D405C15ECA8CF1B9B0469B5627E
                  SHA1:C6BBAEDE7AE2353E15271F1FBAA18588BEF0E922
                  SHA-256:52FF7329D9E47BF7366892E79338FEE702C60D1F3ADB2EDDB601DFAEC8F170A0
                  SHA-512:086EC3F608C80CDB6DC844366CFBBA5237ABCEB5306C0EF7C91600003F1A169CD94EB07D3680E943C9AC498CBA3845857756C5D745A66999BE78C263E5C4405F
                  Malicious:false
                  Preview: Microsoft .NET Framework Assembly Registration Utility version 4.7.3056.0..for Microsoft .NET Framework version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....RegAsm : error RA0000 : Unable to locate input assembly '0' or one of its dependencies...

                  Static File Info

                  General

                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):6.746514435463881
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  • Win32 Executable (generic) a (10002005/4) 49.78%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  • DOS Executable Generic (2002/1) 0.01%
                  File name:Quotation ATB-PR28500KINH.exe
                  File size:1020416
                  MD5:ddb5d5410477cd3855a1f542112808c0
                  SHA1:5fc06ec885cafa6e8f955651b9e2115b705b2b4d
                  SHA256:9f76f4b990ce938d48b11501ad00d99795b172b44b1f94ea7ca3a26ceb64c1d5
                  SHA512:e9c60cc1c03d40c7c45c53fc5a78f1e8b801572a0fdde422fbf8f80bcc8eee89c023c48398a15d388275cf6589f6baab42e511933acad3b3c94cbe4b3d1f819b
                  SSDEEP:24576:MbHvzJzELhKXqKNxNTmV3s03o1+pUfOA:MzzJYLhKlpmV3s6o1UUfP
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....]._................................. ... ....@.. ....................................@................................

                  File Icon

                  Icon Hash:905ada12e9cc368b

                  Static PE Info

                  General

                  Entrypoint:0x4a039e
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                  Time Stamp:0x5FB75DD0 [Fri Nov 20 06:10:24 2020 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:v4.0.30319
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                  Entrypoint Preview

                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al

                  Data Directories

                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xa03440x57.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xa20000x5a94e.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xfe0000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                  Sections

                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000x9e3a40x9e400False0.921722267476data7.86314578381IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  .rsrc0xa20000x5a94e0x5aa00False0.0372737068966data2.71520754372IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0xfe0000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                  Resources

                  NameRVASizeTypeLanguageCountry
                  RT_ICON0xa21d80x42028dBase III DBT, version number 0, next free block index 40EnglishUnited States
                  RT_ICON0xe42000x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                  RT_ICON0xe46680x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 2699173413, next used block 2699173413EnglishUnited States
                  RT_ICON0xe6c100x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 3236110116, next used block 3236110116EnglishUnited States
                  RT_ICON0xe7cb80x10828dBase III DBT, version number 0, next free block index 40EnglishUnited States
                  RT_ICON0xf84e00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 2162368036, next used block 2162368036EnglishUnited States
                  RT_GROUP_ICON0xfc7080x5adataEnglishUnited States
                  RT_MANIFEST0xfc7640x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                  Imports

                  DLLImport
                  mscoree.dll_CorExeMain

                  Possible Origin

                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States

                  Network Behavior

                  Network Port Distribution

                  TCP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Nov 20, 2020 09:26:56.135529041 CET497256184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:26:56.161993980 CET618449725185.140.53.139192.168.2.7
                  Nov 20, 2020 09:26:56.667889118 CET497256184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:26:56.694283962 CET618449725185.140.53.139192.168.2.7
                  Nov 20, 2020 09:26:57.198714972 CET497256184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:26:57.224991083 CET618449725185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:02.588973999 CET497276184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:02.615282059 CET618449727185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:03.121628046 CET497276184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:03.148569107 CET618449727185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:03.652827978 CET497276184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:03.679325104 CET618449727185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:07.725398064 CET497306184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:07.751748085 CET618449730185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:08.262631893 CET497306184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:08.288739920 CET618449730185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:08.793904066 CET497306184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:08.820143938 CET618449730185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:12.901868105 CET497316184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:12.930203915 CET618449731185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:13.434906960 CET497316184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:13.463443995 CET618449731185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:13.974385977 CET497316184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:14.003876925 CET618449731185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:18.046519995 CET497326184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:18.072860003 CET618449732185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:18.701004982 CET497326184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:18.727283001 CET618449732185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:19.310412884 CET497326184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:19.336898088 CET618449732185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:23.383054972 CET497336184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:23.410958052 CET618449733185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:23.920149088 CET497336184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:23.948600054 CET618449733185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:24.451509953 CET497336184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:24.478183985 CET618449733185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:28.548549891 CET497366184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:28.574753046 CET618449736185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:29.093298912 CET497366184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:29.120059013 CET618449736185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:29.655231953 CET497366184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:29.681921959 CET618449736185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:33.734447002 CET497386184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:33.760849953 CET618449738185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:34.277954102 CET497386184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:34.304286003 CET618449738185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:34.983653069 CET497386184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:35.009541035 CET618449738185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:39.057404995 CET497496184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:39.083404064 CET618449749185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:39.593693018 CET497496184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:39.619728088 CET618449749185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:40.296585083 CET497496184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:40.324564934 CET618449749185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:44.412208080 CET497556184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:44.438590050 CET618449755185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:45.093842030 CET497556184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:45.119945049 CET618449755185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:45.797017097 CET497556184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:45.823246956 CET618449755185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:50.218314886 CET497566184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:50.244765043 CET618449756185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:50.859947920 CET497566184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:50.886248112 CET618449756185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:51.547516108 CET497566184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:51.574143887 CET618449756185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:55.622875929 CET497576184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:55.649090052 CET618449757185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:56.297931910 CET497576184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:56.324323893 CET618449757185.140.53.139192.168.2.7
                  Nov 20, 2020 09:27:56.891716957 CET497576184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:27:56.918060064 CET618449757185.140.53.139192.168.2.7
                  Nov 20, 2020 09:28:00.992399931 CET497586184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:28:01.018563032 CET618449758185.140.53.139192.168.2.7
                  Nov 20, 2020 09:28:01.532746077 CET497586184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:28:01.558955908 CET618449758185.140.53.139192.168.2.7
                  Nov 20, 2020 09:28:02.063973904 CET497586184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:28:02.090981960 CET618449758185.140.53.139192.168.2.7
                  Nov 20, 2020 09:28:06.137979984 CET497596184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:28:06.163880110 CET618449759185.140.53.139192.168.2.7
                  Nov 20, 2020 09:28:06.673902035 CET497596184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:28:06.699908972 CET618449759185.140.53.139192.168.2.7
                  Nov 20, 2020 09:28:07.205127954 CET497596184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:28:07.231425047 CET618449759185.140.53.139192.168.2.7
                  Nov 20, 2020 09:28:11.280884981 CET497606184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:28:11.307646036 CET618449760185.140.53.139192.168.2.7
                  Nov 20, 2020 09:28:11.816543102 CET497606184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:28:11.842854023 CET618449760185.140.53.139192.168.2.7
                  Nov 20, 2020 09:28:12.346164942 CET497606184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:28:12.372693062 CET618449760185.140.53.139192.168.2.7
                  Nov 20, 2020 09:28:16.456875086 CET497636184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:28:16.485682011 CET618449763185.140.53.139192.168.2.7
                  Nov 20, 2020 09:28:16.987375975 CET497636184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:28:17.013942957 CET618449763185.140.53.139192.168.2.7
                  Nov 20, 2020 09:28:17.521506071 CET497636184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:28:17.548383951 CET618449763185.140.53.139192.168.2.7
                  Nov 20, 2020 09:28:21.605441093 CET497646184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:28:21.632688046 CET618449764185.140.53.139192.168.2.7
                  Nov 20, 2020 09:28:22.143814087 CET497646184192.168.2.7185.140.53.139
                  Nov 20, 2020 09:28:22.170222044 CET618449764185.140.53.139192.168.2.7

                  UDP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Nov 20, 2020 09:26:35.912642002 CET5805253192.168.2.78.8.8.8
                  Nov 20, 2020 09:26:35.939836979 CET53580528.8.8.8192.168.2.7
                  Nov 20, 2020 09:26:36.980882883 CET5400853192.168.2.78.8.8.8
                  Nov 20, 2020 09:26:37.007913113 CET53540088.8.8.8192.168.2.7
                  Nov 20, 2020 09:26:38.436265945 CET5945153192.168.2.78.8.8.8
                  Nov 20, 2020 09:26:38.463397026 CET53594518.8.8.8192.168.2.7
                  Nov 20, 2020 09:26:39.522572994 CET5291453192.168.2.78.8.8.8
                  Nov 20, 2020 09:26:39.549721956 CET53529148.8.8.8192.168.2.7
                  Nov 20, 2020 09:26:40.618621111 CET6456953192.168.2.78.8.8.8
                  Nov 20, 2020 09:26:40.645675898 CET53645698.8.8.8192.168.2.7
                  Nov 20, 2020 09:26:41.769871950 CET5281653192.168.2.78.8.8.8
                  Nov 20, 2020 09:26:41.798651934 CET53528168.8.8.8192.168.2.7
                  Nov 20, 2020 09:26:42.877338886 CET5078153192.168.2.78.8.8.8
                  Nov 20, 2020 09:26:42.912965059 CET53507818.8.8.8192.168.2.7
                  Nov 20, 2020 09:26:44.836189985 CET5423053192.168.2.78.8.8.8
                  Nov 20, 2020 09:26:44.863204002 CET53542308.8.8.8192.168.2.7
                  Nov 20, 2020 09:26:45.893138885 CET5491153192.168.2.78.8.8.8
                  Nov 20, 2020 09:26:45.920321941 CET53549118.8.8.8192.168.2.7
                  Nov 20, 2020 09:26:46.935808897 CET4995853192.168.2.78.8.8.8
                  Nov 20, 2020 09:26:46.962971926 CET53499588.8.8.8192.168.2.7
                  Nov 20, 2020 09:26:48.047569990 CET5086053192.168.2.78.8.8.8
                  Nov 20, 2020 09:26:48.074825048 CET53508608.8.8.8192.168.2.7
                  Nov 20, 2020 09:26:49.102062941 CET5045253192.168.2.78.8.8.8
                  Nov 20, 2020 09:26:49.129266977 CET53504528.8.8.8192.168.2.7
                  Nov 20, 2020 09:26:50.216165066 CET5973053192.168.2.78.8.8.8
                  Nov 20, 2020 09:26:50.243244886 CET53597308.8.8.8192.168.2.7
                  Nov 20, 2020 09:26:51.362644911 CET5931053192.168.2.78.8.8.8
                  Nov 20, 2020 09:26:51.389772892 CET53593108.8.8.8192.168.2.7
                  Nov 20, 2020 09:26:56.079119921 CET5191953192.168.2.78.8.8.8
                  Nov 20, 2020 09:26:56.116950035 CET53519198.8.8.8192.168.2.7
                  Nov 20, 2020 09:26:58.627288103 CET6429653192.168.2.78.8.8.8
                  Nov 20, 2020 09:26:58.678628922 CET53642968.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:02.549174070 CET5668053192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:02.586632013 CET53566808.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:04.589431047 CET5882053192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:04.616455078 CET53588208.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:07.688446045 CET6098353192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:07.723908901 CET53609838.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:12.862723112 CET4924753192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:12.900499105 CET53492478.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:18.017364979 CET5228653192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:18.044465065 CET53522868.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:23.346471071 CET5606453192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:23.381779909 CET53560648.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:25.628304958 CET6374453192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:25.655551910 CET53637448.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:26.802903891 CET6145753192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:26.840817928 CET53614578.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:28.510669947 CET5836753192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:28.546705008 CET53583678.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:33.006752968 CET6059953192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:33.043761969 CET53605998.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:33.692368031 CET5957153192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:33.728956938 CET53595718.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:33.806638002 CET5268953192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:33.841949940 CET53526898.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:34.320183039 CET5029053192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:34.347261906 CET53502908.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:34.723608017 CET6042753192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:34.759438038 CET53604278.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:35.256510973 CET5620953192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:35.292018890 CET53562098.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:35.805032015 CET5958253192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:35.842928886 CET53595828.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:36.356888056 CET6094953192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:36.384005070 CET53609498.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:36.436245918 CET5854253192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:36.487503052 CET53585428.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:37.080786943 CET5917953192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:37.116519928 CET53591798.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:37.968655109 CET6092753192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:38.005314112 CET53609278.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:38.481499910 CET5785453192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:38.508708954 CET53578548.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:39.020487070 CET6202653192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:39.055859089 CET53620268.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:42.851494074 CET5945353192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:42.888559103 CET53594538.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:44.373290062 CET6246853192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:44.409041882 CET53624688.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:50.148700953 CET5256353192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:50.184417963 CET53525638.8.8.8192.168.2.7
                  Nov 20, 2020 09:27:55.584182978 CET5472153192.168.2.78.8.8.8
                  Nov 20, 2020 09:27:55.621418953 CET53547218.8.8.8192.168.2.7
                  Nov 20, 2020 09:28:00.953408957 CET6282653192.168.2.78.8.8.8
                  Nov 20, 2020 09:28:00.989820004 CET53628268.8.8.8192.168.2.7
                  Nov 20, 2020 09:28:06.099515915 CET6204653192.168.2.78.8.8.8
                  Nov 20, 2020 09:28:06.136332989 CET53620468.8.8.8192.168.2.7
                  Nov 20, 2020 09:28:11.240219116 CET5122353192.168.2.78.8.8.8
                  Nov 20, 2020 09:28:11.277551889 CET53512238.8.8.8192.168.2.7
                  Nov 20, 2020 09:28:12.293785095 CET6390853192.168.2.78.8.8.8
                  Nov 20, 2020 09:28:12.322207928 CET53639088.8.8.8192.168.2.7
                  Nov 20, 2020 09:28:13.937680006 CET4922653192.168.2.78.8.8.8
                  Nov 20, 2020 09:28:13.964711905 CET53492268.8.8.8192.168.2.7
                  Nov 20, 2020 09:28:16.412998915 CET6021253192.168.2.78.8.8.8
                  Nov 20, 2020 09:28:16.448510885 CET53602128.8.8.8192.168.2.7
                  Nov 20, 2020 09:28:21.568610907 CET5886753192.168.2.78.8.8.8
                  Nov 20, 2020 09:28:21.604264975 CET53588678.8.8.8192.168.2.7
                  Nov 20, 2020 09:28:26.713026047 CET5086453192.168.2.78.8.8.8
                  Nov 20, 2020 09:28:26.748627901 CET53508648.8.8.8192.168.2.7
                  Nov 20, 2020 09:28:34.338577032 CET6150453192.168.2.78.8.8.8
                  Nov 20, 2020 09:28:34.374263048 CET53615048.8.8.8192.168.2.7
                  Nov 20, 2020 09:28:39.479101896 CET6023153192.168.2.78.8.8.8
                  Nov 20, 2020 09:28:39.514548063 CET53602318.8.8.8192.168.2.7
                  Nov 20, 2020 09:28:44.617322922 CET5009553192.168.2.78.8.8.8
                  Nov 20, 2020 09:28:44.652806997 CET53500958.8.8.8192.168.2.7
                  Nov 20, 2020 09:28:49.757090092 CET5965453192.168.2.78.8.8.8
                  Nov 20, 2020 09:28:49.792437077 CET53596548.8.8.8192.168.2.7
                  Nov 20, 2020 09:28:55.054315090 CET5823353192.168.2.78.8.8.8
                  Nov 20, 2020 09:28:55.090053082 CET53582338.8.8.8192.168.2.7

                  DNS Queries

                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  Nov 20, 2020 09:26:56.079119921 CET192.168.2.78.8.8.80xb1c3Standard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:02.549174070 CET192.168.2.78.8.8.80xace9Standard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:07.688446045 CET192.168.2.78.8.8.80xa96aStandard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:12.862723112 CET192.168.2.78.8.8.80x8a48Standard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:18.017364979 CET192.168.2.78.8.8.80xf2e6Standard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:23.346471071 CET192.168.2.78.8.8.80x3e7bStandard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:28.510669947 CET192.168.2.78.8.8.80xe9faStandard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:33.692368031 CET192.168.2.78.8.8.80x9a6fStandard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:39.020487070 CET192.168.2.78.8.8.80x27e5Standard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:44.373290062 CET192.168.2.78.8.8.80x176cStandard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:50.148700953 CET192.168.2.78.8.8.80xce7Standard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:55.584182978 CET192.168.2.78.8.8.80xa6adStandard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:00.953408957 CET192.168.2.78.8.8.80x7cdStandard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:06.099515915 CET192.168.2.78.8.8.80xaa79Standard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:11.240219116 CET192.168.2.78.8.8.80xb912Standard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:16.412998915 CET192.168.2.78.8.8.80x8288Standard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:21.568610907 CET192.168.2.78.8.8.80x6bf4Standard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:26.713026047 CET192.168.2.78.8.8.80xb27Standard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:34.338577032 CET192.168.2.78.8.8.80xdca9Standard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:39.479101896 CET192.168.2.78.8.8.80x3bfbStandard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:44.617322922 CET192.168.2.78.8.8.80xe95aStandard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:49.757090092 CET192.168.2.78.8.8.80x85c5Standard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:55.054315090 CET192.168.2.78.8.8.80x6ae4Standard query (0)kengeorge.zapto.orgA (IP address)IN (0x0001)

                  DNS Answers

                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  Nov 20, 2020 09:26:56.116950035 CET8.8.8.8192.168.2.70xb1c3No error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:02.586632013 CET8.8.8.8192.168.2.70xace9No error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:07.723908901 CET8.8.8.8192.168.2.70xa96aNo error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:12.900499105 CET8.8.8.8192.168.2.70x8a48No error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:18.044465065 CET8.8.8.8192.168.2.70xf2e6No error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:23.381779909 CET8.8.8.8192.168.2.70x3e7bNo error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:28.546705008 CET8.8.8.8192.168.2.70xe9faNo error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:33.728956938 CET8.8.8.8192.168.2.70x9a6fNo error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:39.055859089 CET8.8.8.8192.168.2.70x27e5No error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:44.409041882 CET8.8.8.8192.168.2.70x176cNo error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:50.184417963 CET8.8.8.8192.168.2.70xce7No error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:27:55.621418953 CET8.8.8.8192.168.2.70xa6adNo error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:00.989820004 CET8.8.8.8192.168.2.70x7cdNo error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:06.136332989 CET8.8.8.8192.168.2.70xaa79No error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:11.277551889 CET8.8.8.8192.168.2.70xb912No error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:16.448510885 CET8.8.8.8192.168.2.70x8288No error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:21.604264975 CET8.8.8.8192.168.2.70x6bf4No error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:26.748627901 CET8.8.8.8192.168.2.70xb27No error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:34.374263048 CET8.8.8.8192.168.2.70xdca9No error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:39.514548063 CET8.8.8.8192.168.2.70x3bfbNo error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:44.652806997 CET8.8.8.8192.168.2.70xe95aNo error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:49.792437077 CET8.8.8.8192.168.2.70x85c5No error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)
                  Nov 20, 2020 09:28:55.090053082 CET8.8.8.8192.168.2.70x6ae4No error (0)kengeorge.zapto.org185.140.53.139A (IP address)IN (0x0001)

                  Code Manipulations

                  Statistics

                  Behavior

                  Click to jump to process

                  System Behavior

                  General

                  Start time:09:26:41
                  Start date:20/11/2020
                  Path:C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe'
                  Imagebase:0x4f0000
                  File size:1020416 bytes
                  MD5 hash:DDB5D5410477CD3855A1F542112808C0
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.497351250.0000000000B1E000.00000004.00000020.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.497351250.0000000000B1E000.00000004.00000020.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.497351250.0000000000B1E000.00000004.00000020.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.505763687.0000000005342000.00000040.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.505763687.0000000005342000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.505763687.0000000005342000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.503615613.00000000038A1000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.503615613.00000000038A1000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.503615613.00000000038A1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  Reputation:low

                  General

                  Start time:09:26:52
                  Start date:20/11/2020
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  Imagebase:0xd30000
                  File size:64616 bytes
                  MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.503999050.00000000040E9000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.503999050.00000000040E9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.506528891.0000000005AA0000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.506528891.0000000005AA0000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.495967274.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.495967274.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.495967274.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.507063640.0000000006670000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.507063640.0000000006670000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.507063640.0000000006670000.00000004.00000001.sdmp, Author: Joe Security
                  Reputation:moderate

                  General

                  Start time:09:26:53
                  Start date:20/11/2020
                  Path:C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Users\user\Desktop\Quotation ATB-PR28500KINH.exe'
                  Imagebase:0xd00000
                  File size:1020416 bytes
                  MD5 hash:DDB5D5410477CD3855A1F542112808C0
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.497878671.0000000001474000.00000004.00000020.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.497878671.0000000001474000.00000004.00000020.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.497878671.0000000001474000.00000004.00000020.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.504002256.0000000004101000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.504002256.0000000004101000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.504002256.0000000004101000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000002.00000002.515094519.0000000005B42000.00000040.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000002.00000002.515094519.0000000005B42000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000002.00000002.515094519.0000000005B42000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  Reputation:low

                  General

                  Start time:09:26:54
                  Start date:20/11/2020
                  Path:C:\Windows\SysWOW64\schtasks.exe
                  Wow64 process (32bit):true
                  Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpAC5D.tmp'
                  Imagebase:0x200000
                  File size:185856 bytes
                  MD5 hash:15FF7D8324231381BAD48A052F85DF04
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:09:26:54
                  Start date:20/11/2020
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff774ee0000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:09:26:56
                  Start date:20/11/2020
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 0
                  Imagebase:0xa60000
                  File size:64616 bytes
                  MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Reputation:moderate

                  General

                  Start time:09:26:58
                  Start date:20/11/2020
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff6e70f0000
                  File size:625664 bytes
                  MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:09:27:07
                  Start date:20/11/2020
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  Imagebase:0xa40000
                  File size:64616 bytes
                  MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.304004800.0000000002D41000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.304004800.0000000002D41000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.303385478.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.303385478.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.303385478.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.304067682.0000000003D49000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.304067682.0000000003D49000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  Reputation:moderate

                  Disassembly

                  Code Analysis

                  Reset < >