Loading ...

Play interactive tourEdit tour

Analysis Report OFFER.exe

Overview

General Information

Sample Name:OFFER.exe
Analysis ID:322137
MD5:f0a3b70a92ece3204289b3e1e25c9942
SHA1:5af0534294c9f5fd1ada722919ec8583f88f2ac9
SHA256:0a09ec08c850081ffb281f5716859d62093a5f772266503cb67d5e49a4ecd4f4
Tags:NanoCore

Most interesting Screenshot:

Detection

NanoCore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM_3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • OFFER.exe (PID: 6088 cmdline: 'C:\Users\user\Desktop\OFFER.exe' MD5: F0A3B70A92ECE3204289B3E1E25C9942)
    • schtasks.exe (PID: 5436 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RplepwTnfZYE' /XML 'C:\Users\user\AppData\Local\Temp\tmpB5D6.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • OFFER.exe (PID: 5056 cmdline: C:\Users\user\Desktop\OFFER.exe MD5: F0A3B70A92ECE3204289B3E1E25C9942)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.210666466.0000000002EA1000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000000.00000002.211065928.0000000003EA1000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1116cd:$x1: NanoCore.ClientPluginHost
    • 0x143eed:$x1: NanoCore.ClientPluginHost
    • 0x11170a:$x2: IClientNetworkHost
    • 0x143f2a:$x2: IClientNetworkHost
    • 0x11523d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x147a5d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000000.00000002.211065928.0000000003EA1000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000000.00000002.211065928.0000000003EA1000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x111435:$a: NanoCore
      • 0x111445:$a: NanoCore
      • 0x111679:$a: NanoCore
      • 0x11168d:$a: NanoCore
      • 0x1116cd:$a: NanoCore
      • 0x143c55:$a: NanoCore
      • 0x143c65:$a: NanoCore
      • 0x143e99:$a: NanoCore
      • 0x143ead:$a: NanoCore
      • 0x143eed:$a: NanoCore
      • 0x111494:$b: ClientPlugin
      • 0x111696:$b: ClientPlugin
      • 0x1116d6:$b: ClientPlugin
      • 0x143cb4:$b: ClientPlugin
      • 0x143eb6:$b: ClientPlugin
      • 0x143ef6:$b: ClientPlugin
      • 0x1115bb:$c: ProjectData
      • 0x143ddb:$c: ProjectData
      • 0x111fc2:$d: DESCrypto
      • 0x1447e2:$d: DESCrypto
      • 0x11998e:$e: KeepAlive
      00000000.00000002.210800137.0000000002F20000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        Click to see the 1 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\OFFER.exe, ProcessId: 5056, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RplepwTnfZYE' /XML 'C:\Users\user\AppData\Local\Temp\tmpB5D6.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RplepwTnfZYE' /XML 'C:\Users\user\AppData\Local\Temp\tmpB5D6.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\OFFER.exe' , ParentImage: C:\Users\user\Desktop\OFFER.exe, ParentProcessId: 6088, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RplepwTnfZYE' /XML 'C:\Users\user\AppData\Local\Temp\tmpB5D6.tmp', ProcessId: 5436

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Antivirus / Scanner detection for submitted sampleShow sources
        Source: OFFER.exeAvira: detected
        Antivirus detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\RplepwTnfZYE.exeAvira: detection malicious, Label: TR/AD.Nanocore.gzsda
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\RplepwTnfZYE.exeVirustotal: Detection: 57%Perma Link
        Source: C:\Users\user\AppData\Roaming\RplepwTnfZYE.exeMetadefender: Detection: 37%Perma Link
        Source: C:\Users\user\AppData\Roaming\RplepwTnfZYE.exeReversingLabs: Detection: 68%
        Multi AV Scanner detection for submitted fileShow sources
        Source: OFFER.exeVirustotal: Detection: 57%Perma Link
        Source: OFFER.exeMetadefender: Detection: 37%Perma Link
        Source: OFFER.exeReversingLabs: Detection: 68%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.211065928.0000000003EA1000.00000004.00000001.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 4x nop then jmp 055428F7h

        Networking:

        barindex
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: udochukwu.ddns.net
        Source: global trafficTCP traffic: 192.168.2.3:49711 -> 37.18.96.19:2323
        Source: unknownDNS traffic detected: queries for: udochukwu.ddns.net

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.211065928.0000000003EA1000.00000004.00000001.sdmp, type: MEMORY

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000000.00000002.211065928.0000000003EA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.211065928.0000000003EA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_05531016 NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_05530FE5 NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_00723AED
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_02A209C8
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_02A21D2E
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_02A209CD
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_02A231D8
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_02A28EA8
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_02A28FB2
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_02A22F88
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_02A22F77
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_02A23C32
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_02A2E598
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_00722050
        Source: OFFER.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: RplepwTnfZYE.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: OFFER.exe, 00000000.00000000.202703558.00000000007B4000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamemQWh.exe8 vs OFFER.exe
        Source: OFFER.exe, 00000000.00000002.212114802.0000000004FF0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs OFFER.exe
        Source: OFFER.exe, 00000000.00000002.213553763.0000000005BC0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs OFFER.exe
        Source: OFFER.exe, 00000000.00000002.212759761.0000000005460000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameKedermister.dllT vs OFFER.exe
        Source: OFFER.exe, 00000000.00000002.214012672.0000000005CC0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs OFFER.exe
        Source: OFFER.exe, 00000000.00000002.214012672.0000000005CC0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs OFFER.exe
        Source: OFFER.exe, 00000000.00000002.212203919.0000000005050000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameexag vs OFFER.exe
        Source: OFFER.exe, 00000003.00000000.208615410.0000000001024000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamemQWh.exe8 vs OFFER.exe
        Source: OFFER.exeBinary or memory string: OriginalFilenamemQWh.exe8 vs OFFER.exe
        Source: 00000000.00000002.211065928.0000000003EA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.211065928.0000000003EA1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: OFFER.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: RplepwTnfZYE.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: OFFER.exe, IdManager.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: RplepwTnfZYE.exe.0.dr, IdManager.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 0.2.OFFER.exe.720000.0.unpack, IdManager.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 0.0.OFFER.exe.720000.0.unpack, IdManager.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 3.0.OFFER.exe.f90000.0.unpack, IdManager.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@6/5@9/2
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_05530E9A AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_05530E63 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\OFFER.exeFile created: C:\Users\user\AppData\Roaming\RplepwTnfZYE.exeJump to behavior
        Source: C:\Users\user\Desktop\OFFER.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4084:120:WilError_01
        Source: C:\Users\user\Desktop\OFFER.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{e9662336-59a2-4ebb-989e-7c602bdb23a8}
        Source: C:\Users\user\Desktop\OFFER.exeMutant created: \Sessions\1\BaseNamedObjects\qkUPEOxutgScEw
        Source: C:\Users\user\Desktop\OFFER.exeFile created: C:\Users\user\AppData\Local\Temp\tmpB5D6.tmpJump to behavior
        Source: OFFER.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\OFFER.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\OFFER.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\OFFER.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\OFFER.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\OFFER.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\OFFER.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\OFFER.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\OFFER.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: OFFER.exeVirustotal: Detection: 57%
        Source: OFFER.exeMetadefender: Detection: 37%
        Source: OFFER.exeReversingLabs: Detection: 68%
        Source: C:\Users\user\Desktop\OFFER.exeFile read: C:\Users\user\Desktop\OFFER.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\OFFER.exe 'C:\Users\user\Desktop\OFFER.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RplepwTnfZYE' /XML 'C:\Users\user\AppData\Local\Temp\tmpB5D6.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\OFFER.exe C:\Users\user\Desktop\OFFER.exe
        Source: C:\Users\user\Desktop\OFFER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RplepwTnfZYE' /XML 'C:\Users\user\AppData\Local\Temp\tmpB5D6.tmp'
        Source: C:\Users\user\Desktop\OFFER.exeProcess created: C:\Users\user\Desktop\OFFER.exe C:\Users\user\Desktop\OFFER.exe
        Source: C:\Users\user\Desktop\OFFER.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: C:\Users\user\Desktop\OFFER.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: OFFER.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: C:\Users\user\Desktop\OFFER.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: OFFER.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: mscorrc.pdb source: OFFER.exe, 00000000.00000002.212114802.0000000004FF0000.00000002.00000001.sdmp

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: OFFER.exe, IdManager.cs.Net Code: Remoting_Identity_IDGuid System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: RplepwTnfZYE.exe.0.dr, IdManager.cs.Net Code: Remoting_Identity_IDGuid System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.2.OFFER.exe.720000.0.unpack, IdManager.cs.Net Code: Remoting_Identity_IDGuid System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 0.0.OFFER.exe.720000.0.unpack, IdManager.cs.Net Code: Remoting_Identity_IDGuid System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 3.0.OFFER.exe.f90000.0.unpack, IdManager.cs.Net Code: Remoting_Identity_IDGuid System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_00EA2010 push eax; retf
        Source: initial sampleStatic PE information: section name: .text entropy: 7.70065403732
        Source: initial sampleStatic PE information: section name: .text entropy: 7.70065403732
        Source: C:\Users\user\Desktop\OFFER.exeFile created: C:\Users\user\AppData\Roaming\RplepwTnfZYE.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RplepwTnfZYE' /XML 'C:\Users\user\AppData\Local\Temp\tmpB5D6.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\OFFER.exeFile opened: C:\Users\user\Desktop\OFFER.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\OFFER.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM_3Show sources
        Source: Yara matchFile source: 00000000.00000002.210666466.0000000002EA1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.210800137.0000000002F20000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: OFFER.exe PID: 6088, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: OFFER.exe, 00000000.00000002.210666466.0000000002EA1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: OFFER.exe, 00000000.00000002.210666466.0000000002EA1000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\user\Desktop\OFFER.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\OFFER.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\OFFER.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\OFFER.exeWindow / User API: threadDelayed 647
        Source: C:\Users\user\Desktop\OFFER.exeWindow / User API: threadDelayed 852
        Source: C:\Users\user\Desktop\OFFER.exeWindow / User API: foregroundWindowGot 988
        Source: C:\Users\user\Desktop\OFFER.exe TID: 6064Thread sleep time: -49583s >= -30000s
        Source: C:\Users\user\Desktop\OFFER.exe TID: 2796Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\OFFER.exe TID: 5076Thread sleep time: -1844674407370954s >= -30000s
        Source: C:\Users\user\Desktop\OFFER.exe TID: 5072Thread sleep time: -40000s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: OFFER.exe, 00000000.00000002.210666466.0000000002EA1000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: OFFER.exe, 00000000.00000002.210666466.0000000002EA1000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: OFFER.exe, 00000000.00000002.210666466.0000000002EA1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II|update users set password = @password where user_id = @user_id
        Source: OFFER.exe, 00000000.00000002.210666466.0000000002EA1000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: C:\Users\user\Desktop\OFFER.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\OFFER.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\OFFER.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\OFFER.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\OFFER.exeMemory written: C:\Users\user\Desktop\OFFER.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\OFFER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RplepwTnfZYE' /XML 'C:\Users\user\AppData\Local\Temp\tmpB5D6.tmp'
        Source: C:\Users\user\Desktop\OFFER.exeProcess created: C:\Users\user\Desktop\OFFER.exe C:\Users\user\Desktop\OFFER.exe
        Source: C:\Users\user\Desktop\OFFER.exeCode function: 0_2_00E9AEFE GetUserNameW,
        Source: C:\Users\user\Desktop\OFFER.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.211065928.0000000003EA1000.00000004.00000001.sdmp, type: MEMORY

        Remote Access Functionality:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000000.00000002.211065928.0000000003EA1000.00000004.00000001.sdmp, type: MEMORY

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Access Token Manipulation1Masquerading1OS Credential DumpingSecurity Software Discovery211Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection111Virtualization/Sandbox Evasion3LSASS MemoryVirtualization/Sandbox Evasion3Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Disable or Modify Tools1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection111LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsHidden Files and Directories1DCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobObfuscated Files or Information3Proc FilesystemSystem Information Discovery2Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing12/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        OFFER.exe57%VirustotalBrowse
        OFFER.exe41%MetadefenderBrowse
        OFFER.exe69%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        OFFER.exe100%AviraTR/AD.Nanocore.gzsda

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\RplepwTnfZYE.exe100%AviraTR/AD.Nanocore.gzsda
        C:\Users\user\AppData\Roaming\RplepwTnfZYE.exe57%VirustotalBrowse
        C:\Users\user\AppData\Roaming\RplepwTnfZYE.exe41%MetadefenderBrowse
        C:\Users\user\AppData\Roaming\RplepwTnfZYE.exe69%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Unpacked PE Files

        No Antivirus matches

        Domains

        SourceDetectionScannerLabelLink
        udochukwu.ddns.net1%VirustotalBrowse

        URLs

        No Antivirus matches

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        udochukwu.ddns.net
        37.18.96.19
        truetrueunknown

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        37.18.96.19
        unknownNetherlands
        201411GOKNETTRtrue

        Private

        IP
        192.168.2.1

        General Information

        Joe Sandbox Version:31.0.0 Red Diamond
        Analysis ID:322137
        Start date:24.11.2020
        Start time:15:27:11
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 6m 24s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:OFFER.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:26
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@6/5@9/2
        EGA Information:Failed
        HDC Information:Failed
        HCA Information:
        • Successful, ratio: 91%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        Warnings:
        Show All
        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
        • Excluded IPs from analysis (whitelisted): 168.61.161.212, 104.42.151.234, 13.88.21.125, 51.104.139.180, 92.122.144.200, 20.54.26.129, 8.241.122.126, 8.241.9.254, 67.26.139.254, 8.241.11.254, 8.253.204.121, 92.122.213.247, 92.122.213.194, 51.11.168.160
        • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, fs.microsoft.com, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, skypedataprdcolwus16.cloudapp.net, skypedataprdcolwus15.cloudapp.net, au-bg-shim.trafficmanager.net
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        15:27:58API Interceptor1064x Sleep call for process: OFFER.exe modified

        Joe Sandbox View / Context

        IPs

        No context

        Domains

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        udochukwu.ddns.netxh1V3riWZ5.exeGet hashmaliciousBrowse
        • 216.38.8.174
        A2UVQZMMkB.exeGet hashmaliciousBrowse
        • 216.38.8.174
        PURCHASE09812.exeGet hashmaliciousBrowse
        • 185.140.53.132

        ASN

        No context

        JA3 Fingerprints

        No context

        Dropped Files

        No context

        Created / dropped Files

        C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\OFFER.exe.log
        Process:C:\Users\user\Desktop\OFFER.exe
        File Type:ASCII text, with CRLF line terminators
        Category:modified
        Size (bytes):525
        Entropy (8bit):5.2874233355119316
        Encrypted:false
        SSDEEP:12:Q3LaJU20NaL10U29hJ5g1B0U2ukyrFk70Ug+9Yz9tv:MLF20NaL329hJ5g522rWz2T
        MD5:61CCF53571C9ABA6511D696CB0D32E45
        SHA1:A13A42A20EC14942F52DB20FB16A0A520F8183CE
        SHA-256:3459BDF6C0B7F9D43649ADAAF19BA8D5D133BCBE5EF80CF4B7000DC91E10903B
        SHA-512:90E180D9A681F82C010C326456AC88EBB89256CC769E900BFB4B2DF92E69CA69726863B45DFE4627FC1EE8C281F2AF86A6A1E2EF1710094CCD3F4E092872F06F
        Malicious:true
        Reputation:moderate, very likely benign file
        Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..
        C:\Users\user\AppData\Local\Temp\tmpB5D6.tmp
        Process:C:\Users\user\Desktop\OFFER.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):1645
        Entropy (8bit):5.191084760568334
        Encrypted:false
        SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBPtn:cbh47TlNQ//rydbz9I3YODOLNdq3T
        MD5:AB592D06D98D97E7246ACDE4BC6F877E
        SHA1:6F407D15DCD33272C9F36A3B60CE18EA287D943D
        SHA-256:5F401C9D62E49D3C79957EE747E11E54B09AE2577B37BF3FD8E0F59779E17764
        SHA-512:323FEB7A1596BC5CCC43507EC2D975930D4A35E9D726592570FD27CA47874336CB1743BC9F2E4E0BF4A32FA9605280B27281E373F176AE3762E1F33B50EE5BCD
        Malicious:true
        Reputation:low
        Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
        C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Process:C:\Users\user\Desktop\OFFER.exe
        File Type:Non-ISO extended-ASCII text, with no line terminators
        Category:dropped
        Size (bytes):8
        Entropy (8bit):3.0
        Encrypted:false
        SSDEEP:3:fPn:fP
        MD5:94BA71EFD891C3DCB84D299A3569E0DA
        SHA1:D1377C913F96023629C1A07DB3BF23E0BB5F9005
        SHA-256:30F19B17612845ECB696342C4C9306B80FFCEC7BDC5ABA5DC83A9DA346270990
        SHA-512:E82A98D4BB3D4218A77A020B3DF08B6EBD14411C8345EDB9D152B31D3A85098764928DBFE1CA3831A8581FE1F32F15DB0341AD132CCB0AF58B3EDB234A7A5944
        Malicious:true
        Reputation:low
        Preview: i.L...H
        C:\Users\user\AppData\Roaming\RplepwTnfZYE.exe
        Process:C:\Users\user\Desktop\OFFER.exe
        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Category:dropped
        Size (bytes):610816
        Entropy (8bit):7.683539798870558
        Encrypted:false
        SSDEEP:12288:5pV+lmcosZeY2eCbJtTx31jbzNDWMEDBOzuZ2znyo3almjbbLSz9CUo:9cGVF9d1DNDWMYAzuIbyoqlMbPSzbo
        MD5:F0A3B70A92ECE3204289B3E1E25C9942
        SHA1:5AF0534294C9F5FD1ADA722919EC8583F88F2AC9
        SHA-256:0A09EC08C850081FFB281F5716859D62093A5F772266503CB67D5E49A4ECD4F4
        SHA-512:35E3E2924E5B0CA26CD8D25DD0AF84ED89196EF6B4C7202BA2E18EC1741C030CC7D53C86EF0FCC9A876DC151A38A5AB3979D9B948ADB8C2E1560D3FDD35011E0
        Malicious:true
        Antivirus:
        • Antivirus: Avira, Detection: 100%
        • Antivirus: Virustotal, Detection: 57%, Browse
        • Antivirus: Metadefender, Detection: 41%, Browse
        • Antivirus: ReversingLabs, Detection: 69%
        Reputation:low
        Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_..............P......D......>+... ...@....@.. ....................................@..................................*..O....@..xA........................................................................... ............... ..H............text...D.... ...................... ..`.rsrc...xA...@...B..................@..@.reloc...............P..............@..B................ +......H............e...........Y................................................(....*&..(.....*.s.........s.........s ........s!........s"........*...0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*.0..<........~.....((.....,!r...p.....()...o*...s+............~.....+..*.0...........~.....+..*".......*.0..&........(....r-..p~....o,...(-.....t.....+..*...0..&........(....r9..p~....o,...(-.....
        C:\Users\user\AppData\Roaming\RplepwTnfZYE.exe:Zone.Identifier
        Process:C:\Users\user\Desktop\OFFER.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):26
        Entropy (8bit):3.95006375643621
        Encrypted:false
        SSDEEP:3:ggPYV:rPYV
        MD5:187F488E27DB4AF347237FE461A079AD
        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
        Malicious:true
        Reputation:high, very likely benign file
        Preview: [ZoneTransfer]....ZoneId=0

        Static File Info

        General

        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):7.683539798870558
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        • Win32 Executable (generic) a (10002005/4) 49.78%
        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
        • Generic Win/DOS Executable (2004/3) 0.01%
        • DOS Executable Generic (2002/1) 0.01%
        File name:OFFER.exe
        File size:610816
        MD5:f0a3b70a92ece3204289b3e1e25c9942
        SHA1:5af0534294c9f5fd1ada722919ec8583f88f2ac9
        SHA256:0a09ec08c850081ffb281f5716859d62093a5f772266503cb67d5e49a4ecd4f4
        SHA512:35e3e2924e5b0ca26cd8d25dd0af84ed89196ef6b4c7202ba2e18ec1741c030cc7d53c86ef0fcc9a876dc151a38a5ab3979d9b948adb8c2e1560d3fdd35011e0
        SSDEEP:12288:5pV+lmcosZeY2eCbJtTx31jbzNDWMEDBOzuZ2znyo3almjbbLSz9CUo:9cGVF9d1DNDWMYAzuIbyoqlMbPSzbo
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......_..............P......D......>+... ...@....@.. ....................................@................................

        File Icon

        Icon Hash:480f0f49194d4520

        Static PE Info

        General

        Entrypoint:0x492b3e
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Time Stamp:0x5F990EE4 [Wed Oct 28 06:25:40 2020 UTC]
        TLS Callbacks:
        CLR (.Net) Version:v2.0.50727
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

        Entrypoint Preview

        Instruction
        jmp dword ptr [00402000h]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al

        Data Directories

        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x92aec0x4f.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x940000x4178.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x9a0000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

        Sections

        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x90b440x90c00False0.811946783247data7.70065403732IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        .rsrc0x940000x41780x4200False0.340968276515data4.65497389104IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x9a0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

        Resources

        NameRVASizeTypeLanguageCountry
        RT_ICON0x941900x468GLS_BINARY_LSB_FIRST
        RT_ICON0x945f80x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4294967295, next used block 4294967295
        RT_ICON0x956a00x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4294967295, next used block 4294967295
        RT_GROUP_ICON0x97c480x30data
        RT_VERSION0x97c780x314data
        RT_MANIFEST0x97f8c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

        Imports

        DLLImport
        mscoree.dll_CorExeMain

        Version Infos

        DescriptionData
        Translation0x0000 0x04b0
        LegalCopyrightCopyright 2016
        Assembly Version1.0.0.0
        InternalNamemQWh.exe
        FileVersion1.0.0.0
        CompanyName
        LegalTrademarks
        Comments
        ProductNameControlador
        ProductVersion1.0.0.0
        FileDescriptionControlador
        OriginalFilenamemQWh.exe

        Network Behavior

        Network Port Distribution

        TCP Packets

        TimestampSource PortDest PortSource IPDest IP
        Nov 24, 2020 15:28:03.778383017 CET497112323192.168.2.337.18.96.19
        Nov 24, 2020 15:28:06.779992104 CET497112323192.168.2.337.18.96.19
        Nov 24, 2020 15:28:12.780513048 CET497112323192.168.2.337.18.96.19
        Nov 24, 2020 15:28:22.446753979 CET497172323192.168.2.337.18.96.19
        Nov 24, 2020 15:28:25.453433037 CET497172323192.168.2.337.18.96.19
        Nov 24, 2020 15:28:31.469504118 CET497172323192.168.2.337.18.96.19
        Nov 24, 2020 15:28:41.136913061 CET497292323192.168.2.337.18.96.19
        Nov 24, 2020 15:28:44.142489910 CET497292323192.168.2.337.18.96.19
        Nov 24, 2020 15:28:50.158615112 CET497292323192.168.2.337.18.96.19
        Nov 24, 2020 15:28:57.892918110 CET497342323192.168.2.337.18.96.19
        Nov 24, 2020 15:29:00.893838882 CET497342323192.168.2.337.18.96.19
        Nov 24, 2020 15:29:06.910063028 CET497342323192.168.2.337.18.96.19
        Nov 24, 2020 15:29:15.128210068 CET497392323192.168.2.337.18.96.19
        Nov 24, 2020 15:29:18.129841089 CET497392323192.168.2.337.18.96.19
        Nov 24, 2020 15:29:24.146588087 CET497392323192.168.2.337.18.96.19
        Nov 24, 2020 15:29:31.857831001 CET497422323192.168.2.337.18.96.19
        Nov 24, 2020 15:29:34.865459919 CET497422323192.168.2.337.18.96.19
        Nov 24, 2020 15:29:40.881633997 CET497422323192.168.2.337.18.96.19
        Nov 24, 2020 15:29:49.063406944 CET497432323192.168.2.337.18.96.19
        Nov 24, 2020 15:29:52.069961071 CET497432323192.168.2.337.18.96.19
        Nov 24, 2020 15:29:58.086153984 CET497432323192.168.2.337.18.96.19
        Nov 24, 2020 15:30:08.977169037 CET497442323192.168.2.337.18.96.19
        Nov 24, 2020 15:30:12.102895021 CET497442323192.168.2.337.18.96.19
        Nov 24, 2020 15:30:18.103403091 CET497442323192.168.2.337.18.96.19
        Nov 24, 2020 15:30:25.596973896 CET497452323192.168.2.337.18.96.19
        Nov 24, 2020 15:30:28.604291916 CET497452323192.168.2.337.18.96.19
        Nov 24, 2020 15:30:34.620423079 CET497452323192.168.2.337.18.96.19

        UDP Packets

        TimestampSource PortDest PortSource IPDest IP
        Nov 24, 2020 15:27:53.506155968 CET5598453192.168.2.38.8.8.8
        Nov 24, 2020 15:27:53.533616066 CET53559848.8.8.8192.168.2.3
        Nov 24, 2020 15:27:54.659101963 CET6418553192.168.2.38.8.8.8
        Nov 24, 2020 15:27:54.686460018 CET53641858.8.8.8192.168.2.3
        Nov 24, 2020 15:27:56.442240953 CET6511053192.168.2.38.8.8.8
        Nov 24, 2020 15:27:56.478300095 CET53651108.8.8.8192.168.2.3
        Nov 24, 2020 15:27:57.345671892 CET5836153192.168.2.38.8.8.8
        Nov 24, 2020 15:27:57.372770071 CET53583618.8.8.8192.168.2.3
        Nov 24, 2020 15:27:58.937705994 CET6349253192.168.2.38.8.8.8
        Nov 24, 2020 15:27:58.964807034 CET53634928.8.8.8192.168.2.3
        Nov 24, 2020 15:27:59.964009047 CET6083153192.168.2.38.8.8.8
        Nov 24, 2020 15:27:59.991353035 CET53608318.8.8.8192.168.2.3
        Nov 24, 2020 15:28:03.718260050 CET6010053192.168.2.38.8.8.8
        Nov 24, 2020 15:28:03.764199018 CET53601008.8.8.8192.168.2.3
        Nov 24, 2020 15:28:15.093889952 CET5319553192.168.2.38.8.8.8
        Nov 24, 2020 15:28:15.129780054 CET53531958.8.8.8192.168.2.3
        Nov 24, 2020 15:28:16.826072931 CET5014153192.168.2.38.8.8.8
        Nov 24, 2020 15:28:16.853127956 CET53501418.8.8.8192.168.2.3
        Nov 24, 2020 15:28:21.401735067 CET5302353192.168.2.38.8.8.8
        Nov 24, 2020 15:28:21.429003000 CET53530238.8.8.8192.168.2.3
        Nov 24, 2020 15:28:22.360163927 CET4956353192.168.2.38.8.8.8
        Nov 24, 2020 15:28:22.387494087 CET53495638.8.8.8192.168.2.3
        Nov 24, 2020 15:28:22.404793978 CET5135253192.168.2.38.8.8.8
        Nov 24, 2020 15:28:22.445501089 CET53513528.8.8.8192.168.2.3
        Nov 24, 2020 15:28:23.165205956 CET5934953192.168.2.38.8.8.8
        Nov 24, 2020 15:28:23.200990915 CET53593498.8.8.8192.168.2.3
        Nov 24, 2020 15:28:24.037941933 CET5708453192.168.2.38.8.8.8
        Nov 24, 2020 15:28:24.073755980 CET53570848.8.8.8192.168.2.3
        Nov 24, 2020 15:28:25.199189901 CET5882353192.168.2.38.8.8.8
        Nov 24, 2020 15:28:25.226290941 CET53588238.8.8.8192.168.2.3
        Nov 24, 2020 15:28:27.783973932 CET5756853192.168.2.38.8.8.8
        Nov 24, 2020 15:28:27.821347952 CET53575688.8.8.8192.168.2.3
        Nov 24, 2020 15:28:34.769733906 CET5054053192.168.2.38.8.8.8
        Nov 24, 2020 15:28:34.796920061 CET53505408.8.8.8192.168.2.3
        Nov 24, 2020 15:28:35.618417978 CET5436653192.168.2.38.8.8.8
        Nov 24, 2020 15:28:35.645675898 CET53543668.8.8.8192.168.2.3
        Nov 24, 2020 15:28:38.654897928 CET5303453192.168.2.38.8.8.8
        Nov 24, 2020 15:28:38.681972980 CET53530348.8.8.8192.168.2.3
        Nov 24, 2020 15:28:39.306180000 CET5776253192.168.2.38.8.8.8
        Nov 24, 2020 15:28:39.356237888 CET53577628.8.8.8192.168.2.3
        Nov 24, 2020 15:28:39.559573889 CET5543553192.168.2.38.8.8.8
        Nov 24, 2020 15:28:39.586956024 CET53554358.8.8.8192.168.2.3
        Nov 24, 2020 15:28:41.097023964 CET5071353192.168.2.38.8.8.8
        Nov 24, 2020 15:28:41.134298086 CET53507138.8.8.8192.168.2.3
        Nov 24, 2020 15:28:44.236629963 CET5613253192.168.2.38.8.8.8
        Nov 24, 2020 15:28:44.263674021 CET53561328.8.8.8192.168.2.3
        Nov 24, 2020 15:28:55.406728029 CET5898753192.168.2.38.8.8.8
        Nov 24, 2020 15:28:55.434057951 CET53589878.8.8.8192.168.2.3
        Nov 24, 2020 15:28:57.856010914 CET5657953192.168.2.38.8.8.8
        Nov 24, 2020 15:28:57.891792059 CET53565798.8.8.8192.168.2.3
        Nov 24, 2020 15:28:57.897439957 CET6063353192.168.2.38.8.8.8
        Nov 24, 2020 15:28:57.934497118 CET53606338.8.8.8192.168.2.3
        Nov 24, 2020 15:29:15.099493980 CET6129253192.168.2.38.8.8.8
        Nov 24, 2020 15:29:15.126679897 CET53612928.8.8.8192.168.2.3
        Nov 24, 2020 15:29:30.311285019 CET6361953192.168.2.38.8.8.8
        Nov 24, 2020 15:29:30.338418961 CET53636198.8.8.8192.168.2.3
        Nov 24, 2020 15:29:31.783803940 CET6493853192.168.2.38.8.8.8
        Nov 24, 2020 15:29:31.815838099 CET6194653192.168.2.38.8.8.8
        Nov 24, 2020 15:29:31.819479942 CET53649388.8.8.8192.168.2.3
        Nov 24, 2020 15:29:31.851372004 CET53619468.8.8.8192.168.2.3
        Nov 24, 2020 15:29:49.024101973 CET6491053192.168.2.38.8.8.8
        Nov 24, 2020 15:29:49.059978962 CET53649108.8.8.8192.168.2.3
        Nov 24, 2020 15:30:07.586671114 CET5212353192.168.2.38.8.8.8
        Nov 24, 2020 15:30:07.624885082 CET53521238.8.8.8192.168.2.3
        Nov 24, 2020 15:30:25.558933020 CET5613053192.168.2.38.8.8.8
        Nov 24, 2020 15:30:25.596074104 CET53561308.8.8.8192.168.2.3

        DNS Queries

        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
        Nov 24, 2020 15:28:03.718260050 CET192.168.2.38.8.8.80x330bStandard query (0)udochukwu.ddns.netA (IP address)IN (0x0001)
        Nov 24, 2020 15:28:22.404793978 CET192.168.2.38.8.8.80x731bStandard query (0)udochukwu.ddns.netA (IP address)IN (0x0001)
        Nov 24, 2020 15:28:41.097023964 CET192.168.2.38.8.8.80xdf3eStandard query (0)udochukwu.ddns.netA (IP address)IN (0x0001)
        Nov 24, 2020 15:28:57.856010914 CET192.168.2.38.8.8.80x7759Standard query (0)udochukwu.ddns.netA (IP address)IN (0x0001)
        Nov 24, 2020 15:29:15.099493980 CET192.168.2.38.8.8.80xdf0bStandard query (0)udochukwu.ddns.netA (IP address)IN (0x0001)
        Nov 24, 2020 15:29:31.815838099 CET192.168.2.38.8.8.80xe3daStandard query (0)udochukwu.ddns.netA (IP address)IN (0x0001)
        Nov 24, 2020 15:29:49.024101973 CET192.168.2.38.8.8.80x8150Standard query (0)udochukwu.ddns.netA (IP address)IN (0x0001)
        Nov 24, 2020 15:30:07.586671114 CET192.168.2.38.8.8.80x371eStandard query (0)udochukwu.ddns.netA (IP address)IN (0x0001)
        Nov 24, 2020 15:30:25.558933020 CET192.168.2.38.8.8.80x748eStandard query (0)udochukwu.ddns.netA (IP address)IN (0x0001)

        DNS Answers

        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
        Nov 24, 2020 15:28:03.764199018 CET8.8.8.8192.168.2.30x330bNo error (0)udochukwu.ddns.net37.18.96.19A (IP address)IN (0x0001)
        Nov 24, 2020 15:28:22.445501089 CET8.8.8.8192.168.2.30x731bNo error (0)udochukwu.ddns.net37.18.96.19A (IP address)IN (0x0001)
        Nov 24, 2020 15:28:41.134298086 CET8.8.8.8192.168.2.30xdf3eNo error (0)udochukwu.ddns.net37.18.96.19A (IP address)IN (0x0001)
        Nov 24, 2020 15:28:57.891792059 CET8.8.8.8192.168.2.30x7759No error (0)udochukwu.ddns.net37.18.96.19A (IP address)IN (0x0001)
        Nov 24, 2020 15:29:15.126679897 CET8.8.8.8192.168.2.30xdf0bNo error (0)udochukwu.ddns.net37.18.96.19A (IP address)IN (0x0001)
        Nov 24, 2020 15:29:31.851372004 CET8.8.8.8192.168.2.30xe3daNo error (0)udochukwu.ddns.net37.18.96.19A (IP address)IN (0x0001)
        Nov 24, 2020 15:29:49.059978962 CET8.8.8.8192.168.2.30x8150No error (0)udochukwu.ddns.net37.18.96.19A (IP address)IN (0x0001)
        Nov 24, 2020 15:30:07.624885082 CET8.8.8.8192.168.2.30x371eNo error (0)udochukwu.ddns.net37.18.96.19A (IP address)IN (0x0001)
        Nov 24, 2020 15:30:25.596074104 CET8.8.8.8192.168.2.30x748eNo error (0)udochukwu.ddns.net37.18.96.19A (IP address)IN (0x0001)

        Code Manipulations

        Statistics

        Behavior

        Click to jump to process

        System Behavior

        General

        Start time:15:27:58
        Start date:24/11/2020
        Path:C:\Users\user\Desktop\OFFER.exe
        Wow64 process (32bit):true
        Commandline:'C:\Users\user\Desktop\OFFER.exe'
        Imagebase:0x720000
        File size:610816 bytes
        MD5 hash:F0A3B70A92ECE3204289B3E1E25C9942
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:.Net C# or VB.NET
        Yara matches:
        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.210666466.0000000002EA1000.00000004.00000001.sdmp, Author: Joe Security
        • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.211065928.0000000003EA1000.00000004.00000001.sdmp, Author: Florian Roth
        • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.211065928.0000000003EA1000.00000004.00000001.sdmp, Author: Joe Security
        • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.211065928.0000000003EA1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
        • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.210800137.0000000002F20000.00000004.00000001.sdmp, Author: Joe Security
        Reputation:low

        General

        Start time:15:28:00
        Start date:24/11/2020
        Path:C:\Windows\SysWOW64\schtasks.exe
        Wow64 process (32bit):true
        Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\RplepwTnfZYE' /XML 'C:\Users\user\AppData\Local\Temp\tmpB5D6.tmp'
        Imagebase:0x1390000
        File size:185856 bytes
        MD5 hash:15FF7D8324231381BAD48A052F85DF04
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        General

        Start time:15:28:00
        Start date:24/11/2020
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff6b2800000
        File size:625664 bytes
        MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        General

        Start time:15:28:01
        Start date:24/11/2020
        Path:C:\Users\user\Desktop\OFFER.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\Desktop\OFFER.exe
        Imagebase:0xf90000
        File size:610816 bytes
        MD5 hash:F0A3B70A92ECE3204289B3E1E25C9942
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:.Net C# or VB.NET
        Reputation:low

        Disassembly

        Code Analysis

        Reset < >