Loading ...

Play interactive tourEdit tour

Analysis Report PO456789.exe

Overview

General Information

Sample Name:PO456789.exe
Analysis ID:322271
MD5:6997fbda2b03ac3c34fec92ed6375e40
SHA1:4d16de6b50332cc05fca066125937c364dda961f
SHA256:6ed6aebe6d0b839ab5a5bebad7d58d72445146afa8ee9742f9b0e287f007b3c4

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected Nanocore RAT
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Connects to many ports of the same IP (likely port scanning)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Protects its processes via BreakOnTermination flag
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses cmd line tools excessively to alter registry or file data
Uses dynamic DNS services
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara signature match

Classification

Startup

  • System is w10x64
  • PO456789.exe (PID: 5916 cmdline: 'C:\Users\user\Desktop\PO456789.exe' MD5: 6997FBDA2B03AC3C34FEC92ED6375E40)
    • cmd.exe (PID: 4228 cmdline: 'C:\Windows\System32\cmd.exe' /c copy 'C:\Users\user\Desktop\PO456789.exe' 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 4816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 5988 cmdline: 'C:\Windows\System32\cmd.exe' /c, 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 6092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • fifyt.exe (PID: 6272 cmdline: C:\Users\user\AppData\Local\fifyt.exe MD5: 6997FBDA2B03AC3C34FEC92ED6375E40)
        • cmd.exe (PID: 4940 cmdline: 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 6544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • reg.exe (PID: 4780 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
        • InstallUtil.exe (PID: 6712 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
          • schtasks.exe (PID: 6716 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
            • conhost.exe (PID: 6952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • schtasks.exe (PID: 6996 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpC96C.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
            • conhost.exe (PID: 6924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
        • cmd.exe (PID: 6732 cmdline: 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 6792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • reg.exe (PID: 6776 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
        • cmd.exe (PID: 6692 cmdline: 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 6720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • reg.exe (PID: 6968 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
        • cmd.exe (PID: 204 cmdline: 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 4592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • reg.exe (PID: 4228 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
        • cmd.exe (PID: 6112 cmdline: 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 2240 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • reg.exe (PID: 5920 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
        • cmd.exe (PID: 7160 cmdline: 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 7028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • reg.exe (PID: 6896 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
        • cmd.exe (PID: 6988 cmdline: 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
          • conhost.exe (PID: 6264 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
          • reg.exe (PID: 6996 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
  • InstallUtil.exe (PID: 4812 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe 0 MD5: EFEC8C379D165E3F33B536739AEE26A3)
    • conhost.exe (PID: 4864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • fifyt.exe (PID: 5048 cmdline: 'C:\Users\user\AppData\Local\fifyt.exe' MD5: 6997FBDA2B03AC3C34FEC92ED6375E40)
    • InstallUtil.exe (PID: 7016 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
  • dhcpmon.exe (PID: 6560 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: EFEC8C379D165E3F33B536739AEE26A3)
    • conhost.exe (PID: 5616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"C2: ": ["185.244.30.212"], "Version: ": "NanoCore Client, Version=1.2.2.0"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000009.00000002.922011910.0000000005530000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    00000009.00000002.922011910.0000000005530000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    Click to see the 40 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    9.2.InstallUtil.exe.62c0000.4.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xd9ad:$x1: NanoCore.ClientPluginHost
    • 0xd9da:$x2: IClientNetworkHost
    9.2.InstallUtil.exe.62c0000.4.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xd9ad:$x2: NanoCore.ClientPluginHost
    • 0xea88:$s4: PipeCreated
    • 0xd9c7:$s5: IClientLoggingHost
    9.2.InstallUtil.exe.62c0000.4.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      9.2.InstallUtil.exe.5530000.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      9.2.InstallUtil.exe.5530000.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      Click to see the 11 entries

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ProcessId: 6712, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Sigma detected: Scheduled temp file as task from temp locationShow sources
      Source: Process startedAuthor: Joe Security: Data: Command: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp', CommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp', CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe, ParentProcessId: 6712, ProcessCommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp', ProcessId: 6716

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: InstallUtil.exe.7016.32.memstrMalware Configuration Extractor: NanoCore {"C2: ": ["185.244.30.212"], "Version: ": "NanoCore Client, Version=1.2.2.0"}
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.918066264.0000000002AF1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.720376999.0000000002891000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: fifyt.exe PID: 5048, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7016, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6712, type: MEMORY
      Source: Yara matchFile source: 9.2.InstallUtil.exe.62c0000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.InstallUtil.exe.62c0000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
      Source: 9.2.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: 9.2.InstallUtil.exe.62c0000.4.unpackAvira: Label: TR/NanoCore.fadte
      Source: 32.2.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then push dword ptr [ebp-20h]
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then push dword ptr [ebp-24h]
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then xor edx, edx
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then push dword ptr [ebp-20h]
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then push dword ptr [ebp-24h]
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then xor edx, edx
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then mov ecx, dword ptr [03DEE69Ch]
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then push dword ptr [ebp-20h]
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then push dword ptr [ebp-24h]
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then push dword ptr [ebp-20h]
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then xor edx, edx
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then push dword ptr [ebp-24h]
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then xor edx, edx
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov ecx, dword ptr [0351E69Ch]
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then push dword ptr [ebp-24h]
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then push dword ptr [ebp-20h]
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then push dword ptr [ebp-24h]
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then xor edx, edx
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then xor edx, edx
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then push dword ptr [ebp-20h]
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh

      Networking:

      barindex
      Connects to many ports of the same IP (likely port scanning)Show sources
      Source: global trafficTCP traffic: 185.244.30.212 ports 57689,5,6,7,8,9
      Source: global trafficTCP traffic: 105.112.96.12 ports 57689,5,6,7,8,9
      Uses dynamic DNS servicesShow sources
      Source: unknownDNS query: name: smithcity123.ddns.net
      Source: global trafficTCP traffic: 192.168.2.4:49733 -> 105.112.96.12:57689
      Source: global trafficTCP traffic: 192.168.2.4:49765 -> 185.244.30.212:57689
      Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
      Source: Joe Sandbox ViewASN Name: VNL1-ASNG VNL1-ASNG
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.30.212
      Source: unknownDNS traffic detected: queries for: smithcity123.ddns.net
      Source: PO456789.exe, 00000000.00000002.665138139.00000000011AA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
      Source: InstallUtil.exe, 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.918066264.0000000002AF1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.720376999.0000000002891000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: fifyt.exe PID: 5048, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7016, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6712, type: MEMORY
      Source: Yara matchFile source: 9.2.InstallUtil.exe.62c0000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.InstallUtil.exe.62c0000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE

      Operating System Destruction:

      barindex
      Protects its processes via BreakOnTermination flagShow sources
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: 01 00 00 00

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000009.00000002.922011910.0000000005530000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000020.00000002.720376999.0000000002891000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: fifyt.exe PID: 5048, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: fifyt.exe PID: 5048, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: InstallUtil.exe PID: 7016, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: InstallUtil.exe PID: 7016, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: InstallUtil.exe PID: 6712, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: InstallUtil.exe PID: 6712, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 9.2.InstallUtil.exe.62c0000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 9.2.InstallUtil.exe.5530000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 9.2.InstallUtil.exe.62c0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      .NET source code contains very large array initializationsShow sources
      Source: PO456789.exe, Lg6/u0032Kr.csLarge array initialization: 5q_: array initializer size 91136
      Source: 0.2.PO456789.exe.a10000.0.unpack, Lg6/u0032Kr.csLarge array initialization: 5q_: array initializer size 91136
      Source: 0.0.PO456789.exe.a10000.0.unpack, Lg6/u0032Kr.csLarge array initialization: 5q_: array initializer size 91136
      Source: fifyt.exe.1.dr, Lg6/u0032Kr.csLarge array initialization: 5q_: array initializer size 91136
      Source: 5.2.fifyt.exe.1c0000.0.unpack, Lg6/u0032Kr.csLarge array initialization: 5q_: array initializer size 91136
      Source: 5.0.fifyt.exe.1c0000.0.unpack, Lg6/u0032Kr.csLarge array initialization: 5q_: array initializer size 91136
      Source: 26.0.fifyt.exe.860000.0.unpack, Lg6/u0032Kr.csLarge array initialization: 5q_: array initializer size 91136
      Source: 26.2.fifyt.exe.860000.0.unpack, Lg6/u0032Kr.csLarge array initialization: 5q_: array initializer size 91136
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF42B8
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF2498
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF2F90
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF5D78
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF42A8
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF2493
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BFAB38
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF2F83
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF7A18
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BFF880
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BFF870
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_02BF5D68
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B742B8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B72498
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B72F90
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B75D78
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B742A8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B7248A
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B7AB38
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B72F82
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B7F880
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B7F870
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B77A18
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_00B75D68
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_0501E471
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_0501E480
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_0501BBD4
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_06780040
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 21_2_010107C8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_02A442A8
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_02A4248B
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_02A42F83
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_02A45D68
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_02A4AB38
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_02A4F880
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_02A4F870
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 27_2_002520B0
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 27_2_00BB07C8
      Source: PO456789.exe, 00000000.00000002.670141096.0000000008E90000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs PO456789.exe
      Source: PO456789.exe, 00000000.00000002.665138139.00000000011AA000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO456789.exe
      Source: PO456789.exe, 00000000.00000002.670354069.0000000008F90000.00000002.00000001.sdmpBinary or memory string: originalfilename vs PO456789.exe
      Source: PO456789.exe, 00000000.00000002.670354069.0000000008F90000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs PO456789.exe
      Source: PO456789.exe, 00000000.00000002.668951948.00000000054D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs PO456789.exe
      Source: PO456789.exe, 00000000.00000002.664827057.0000000000AA4000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameStub37.exe. vs PO456789.exe
      Source: PO456789.exe, 00000000.00000002.665964234.0000000003DF1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameDESdgdhser.dll0 vs PO456789.exe
      Source: PO456789.exeBinary or memory string: OriginalFilenameStub37.exe. vs PO456789.exe
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000009.00000002.922011910.0000000005530000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000009.00000002.922011910.0000000005530000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000020.00000002.720376999.0000000002891000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: fifyt.exe PID: 5048, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: fifyt.exe PID: 5048, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: InstallUtil.exe PID: 7016, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: InstallUtil.exe PID: 7016, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: InstallUtil.exe PID: 6712, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: InstallUtil.exe PID: 6712, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 9.2.InstallUtil.exe.62c0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 9.2.InstallUtil.exe.62c0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 9.2.InstallUtil.exe.5530000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 9.2.InstallUtil.exe.5530000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 9.2.InstallUtil.exe.62c0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 9.2.InstallUtil.exe.62c0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 9.2.InstallUtil.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 9.2.InstallUtil.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 9.2.InstallUtil.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: fifyt.exe, 00000005.00000002.923643082.0000000008DB3000.00000004.00000001.sdmpBinary or memory string: ft\WindowsApps;PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBp+' .
      Source: classification engineClassification label: mal100.troj.evad.winEXE@220/11@6/2
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO456789.exe.logJump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6720:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6264:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6952:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4592:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7028:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2240:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6792:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5616:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6924:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6544:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{adbd9fab-b8d2-4b8b-b8ff-e45b2d6b4946}
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6092:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4864:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4816:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Temp\tmpC4E7.tmpJump to behavior
      Source: PO456789.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\PO456789.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\AppData\Local\fifyt.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\AppData\Local\fifyt.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\PO456789.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\PO456789.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\PO456789.exe 'C:\Users\user\Desktop\PO456789.exe'
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c copy 'C:\Users\user\Desktop\PO456789.exe' 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c, 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Users\user\AppData\Local\fifyt.exe C:\Users\user\AppData\Local\fifyt.exe
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp'
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpC96C.tmp'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe 0
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Users\user\AppData\Local\fifyt.exe 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\Desktop\PO456789.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c copy 'C:\Users\user\Desktop\PO456789.exe' 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\Desktop\PO456789.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c, 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\fifyt.exe C:\Users\user\AppData\Local\fifyt.exe
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe 0
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp'
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpC96C.tmp'
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\Desktop\PO456789.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Users\user\Desktop\PO456789.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: PO456789.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: PO456789.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
      Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: dhcpmon.exe, 0000001B.00000002.697779760.0000000000252000.00000002.00020000.sdmp, dhcpmon.exe.9.dr
      Source: Binary string: InstallUtil.pdb source: dhcpmon.exe, dhcpmon.exe.9.dr

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: 9.2.InstallUtil.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 9.2.InstallUtil.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_00A123E2 push edx; iretd
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_00A123C9 pushfd ; iretd
      Source: C:\Users\user\Desktop\PO456789.exeCode function: 0_2_00A1249D push 75C6687Ch; iretd
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_001C249D push 75C6687Ch; iretd
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_001C23C9 pushfd ; iretd
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 5_2_001C23E2 push edx; iretd
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_008623C9 pushfd ; iretd
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_0086249D push 75C6687Ch; iretd
      Source: C:\Users\user\AppData\Local\fifyt.exeCode function: 26_2_008623E2 push edx; iretd
      Source: 9.2.InstallUtil.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 9.2.InstallUtil.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'

      Persistence and Installation Behavior:

      barindex
      Uses cmd line tools excessively to alter registry or file dataShow sources
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\fifyt.exeJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp'
      Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run fiffytJump to behavior
      Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run fiffytJump to behavior

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Users\user\Desktop\PO456789.exeFile opened: C:\Users\user\Desktop\PO456789.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\AppData\Local\fifyt.exeFile opened: C:\Users\user\AppData\Local\fifyt.exe:Zone.Identifier read attributes | delete
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\AppData\Local\fifyt.exeFile opened: C:\Users\user\AppData\Local\fifyt.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\AppData\Local\fifyt.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO456789.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: PO456789.exe, 00000000.00000002.665964234.0000000003DF1000.00000004.00000001.sdmp, fifyt.exe, 00000005.00000002.918713126.0000000003521000.00000004.00000001.sdmp, fifyt.exe, 0000001A.00000002.918721922.0000000003C41000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL!:ZONE.IDENTIFIER
      Source: C:\Users\user\AppData\Local\fifyt.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\PO456789.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 5700
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 3741
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: foregroundWindowGot 790
      Source: C:\Users\user\Desktop\PO456789.exe TID: 5688Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\AppData\Local\fifyt.exe TID: 5744Thread sleep count: 35 > 30
      Source: C:\Users\user\AppData\Local\fifyt.exe TID: 5744Thread sleep time: -35000s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5992Thread sleep time: -15679732462653109s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 5708Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\AppData\Local\fifyt.exe TID: 940Thread sleep count: 66 > 30
      Source: C:\Users\user\AppData\Local\fifyt.exe TID: 940Thread sleep time: -66000s >= -30000s
      Source: C:\Users\user\AppData\Local\fifyt.exe TID: 7024Thread sleep count: 61 > 30
      Source: C:\Users\user\AppData\Local\fifyt.exe TID: 7024Thread sleep time: -30500s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5660Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 6812Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\AppData\Local\fifyt.exeLast function: Thread delayed
      Source: C:\Users\user\AppData\Local\fifyt.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\AppData\Local\fifyt.exeLast function: Thread delayed
      Source: C:\Users\user\AppData\Local\fifyt.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: reg.exe, 00000008.00000002.674973226.0000000003180000.00000002.00000001.sdmp, InstallUtil.exe, 00000009.00000002.922641670.0000000006DF0000.00000002.00000001.sdmp, reg.exe, 0000000C.00000002.680010703.0000000000F90000.00000002.00000001.sdmp, reg.exe, 00000010.00000002.686514488.0000000001000000.00000002.00000001.sdmp, InstallUtil.exe, 00000015.00000002.694682303.00000000051F0000.00000002.00000001.sdmp, reg.exe, 00000019.00000002.694835125.00000000034C0000.00000002.00000001.sdmp, dhcpmon.exe, 0000001B.00000002.698928388.0000000004B70000.00000002.00000001.sdmp, reg.exe, 0000001F.00000002.701484733.00000000035A0000.00000002.00000001.sdmp, reg.exe, 00000024.00000002.707263552.00000000036B0000.00000002.00000001.sdmp, reg.exe, 00000027.00000002.712079491.0000000003910000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: InstallUtil.exe, 00000009.00000002.922353103.0000000006540000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll3
      Source: PO456789.exe, 00000000.00000002.665964234.0000000003DF1000.00000004.00000001.sdmp, fifyt.exe, 00000005.00000002.918713126.0000000003521000.00000004.00000001.sdmp, fifyt.exe, 0000001A.00000002.918721922.0000000003C41000.00000004.00000001.sdmpBinary or memory string: VirtualMachineDetector
      Source: reg.exe, 00000008.00000002.674973226.0000000003180000.00000002.00000001.sdmp, InstallUtil.exe, 00000009.00000002.922641670.0000000006DF0000.00000002.00000001.sdmp, reg.exe, 0000000C.00000002.680010703.0000000000F90000.00000002.00000001.sdmp, reg.exe, 00000010.00000002.686514488.0000000001000000.00000002.00000001.sdmp, InstallUtil.exe, 00000015.00000002.694682303.00000000051F0000.00000002.00000001.sdmp, reg.exe, 00000019.00000002.694835125.00000000034C0000.00000002.00000001.sdmp, dhcpmon.exe, 0000001B.00000002.698928388.0000000004B70000.00000002.00000001.sdmp, reg.exe, 0000001F.00000002.701484733.00000000035A0000.00000002.00000001.sdmp, reg.exe, 00000024.00000002.707263552.00000000036B0000.00000002.00000001.sdmp, reg.exe, 00000027.00000002.712079491.0000000003910000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: reg.exe, 00000008.00000002.674973226.0000000003180000.00000002.00000001.sdmp, InstallUtil.exe, 00000009.00000002.922641670.0000000006DF0000.00000002.00000001.sdmp, reg.exe, 0000000C.00000002.680010703.0000000000F90000.00000002.00000001.sdmp, reg.exe, 00000010.00000002.686514488.0000000001000000.00000002.00000001.sdmp, InstallUtil.exe, 00000015.00000002.694682303.00000000051F0000.00000002.00000001.sdmp, reg.exe, 00000019.00000002.694835125.00000000034C0000.00000002.00000001.sdmp, dhcpmon.exe, 0000001B.00000002.698928388.0000000004B70000.00000002.00000001.sdmp, reg.exe, 0000001F.00000002.701484733.00000000035A0000.00000002.00000001.sdmp, reg.exe, 00000024.00000002.707263552.00000000036B0000.00000002.00000001.sdmp, reg.exe, 00000027.00000002.712079491.0000000003910000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: reg.exe, 00000008.00000002.674973226.0000000003180000.00000002.00000001.sdmp, InstallUtil.exe, 00000009.00000002.922641670.0000000006DF0000.00000002.00000001.sdmp, reg.exe, 0000000C.00000002.680010703.0000000000F90000.00000002.00000001.sdmp, reg.exe, 00000010.00000002.686514488.0000000001000000.00000002.00000001.sdmp, InstallUtil.exe, 00000015.00000002.694682303.00000000051F0000.00000002.00000001.sdmp, reg.exe, 00000019.00000002.694835125.00000000034C0000.00000002.00000001.sdmp, dhcpmon.exe, 0000001B.00000002.698928388.0000000004B70000.00000002.00000001.sdmp, reg.exe, 0000001F.00000002.701484733.00000000035A0000.00000002.00000001.sdmp, reg.exe, 00000024.00000002.707263552.00000000036B0000.00000002.00000001.sdmp, reg.exe, 00000027.00000002.712079491.0000000003910000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\PO456789.exeProcess token adjusted: Debug
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess token adjusted: Debug
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: Debug
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: Debug
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: Debug
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\PO456789.exeMemory allocated: page read and write | page guard
      Source: C:\Users\user\Desktop\PO456789.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c copy 'C:\Users\user\Desktop\PO456789.exe' 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\Desktop\PO456789.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c, 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\fifyt.exe C:\Users\user\AppData\Local\fifyt.exe
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe 0
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp'
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpC96C.tmp'
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Users\user\AppData\Local\fifyt.exeProcess created: unknown unknown
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
      Source: fifyt.exe, 00000005.00000002.917999799.0000000000F40000.00000002.00000001.sdmp, InstallUtil.exe, 00000009.00000002.918861771.0000000003085000.00000004.00000001.sdmp, fifyt.exe, 0000001A.00000002.917572256.0000000001580000.00000002.00000001.sdmpBinary or memory string: Program Manager
      Source: fifyt.exe, 00000005.00000002.917999799.0000000000F40000.00000002.00000001.sdmp, InstallUtil.exe, 00000009.00000002.917765494.00000000014E0000.00000002.00000001.sdmp, fifyt.exe, 0000001A.00000002.917572256.0000000001580000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: fifyt.exe, 00000005.00000002.917999799.0000000000F40000.00000002.00000001.sdmp, InstallUtil.exe, 00000009.00000002.917765494.00000000014E0000.00000002.00000001.sdmp, fifyt.exe, 0000001A.00000002.917572256.0000000001580000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: fifyt.exe, 00000005.00000002.917999799.0000000000F40000.00000002.00000001.sdmp, InstallUtil.exe, 00000009.00000002.917765494.00000000014E0000.00000002.00000001.sdmp, fifyt.exe, 0000001A.00000002.917572256.0000000001580000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: C:\Users\user\Desktop\PO456789.exeQueries volume information: C:\Users\user\Desktop\PO456789.exe VolumeInformation
      Source: C:\Users\user\Desktop\PO456789.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\PO456789.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\PO456789.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Users\user\AppData\Local\fifyt.exe VolumeInformation
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Users\user\AppData\Local\fifyt.exe VolumeInformation
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\AppData\Local\fifyt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\PO456789.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.918066264.0000000002AF1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.720376999.0000000002891000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: fifyt.exe PID: 5048, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7016, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6712, type: MEMORY
      Source: Yara matchFile source: 9.2.InstallUtil.exe.62c0000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.InstallUtil.exe.62c0000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: PO456789.exe, 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: fifyt.exe, 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: InstallUtil.exe, 00000009.00000002.918066264.0000000002AF1000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: InstallUtil.exe, 00000009.00000002.918066264.0000000002AF1000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Source: fifyt.exe, 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: InstallUtil.exe, 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: InstallUtil.exe, 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.918066264.0000000002AF1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.720376999.0000000002891000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: fifyt.exe PID: 5048, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7016, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6712, type: MEMORY
      Source: Yara matchFile source: 9.2.InstallUtil.exe.62c0000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 9.2.InstallUtil.exe.62c0000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 32.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsCommand and Scripting Interpreter1Scheduled Task/Job1Process Injection12Disable or Modify Tools1Input Capture21File and Directory Discovery1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/Job1Registry Run Keys / Startup Folder1Scheduled Task/Job1Deobfuscate/Decode Files or Information1LSASS MemorySystem Information Discovery12Remote Desktop ProtocolInput Capture21Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Registry Run Keys / Startup Folder1Obfuscated Files or Information2Security Account ManagerQuery Registry1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing11NTDSSecurity Software Discovery111Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading2LSA SecretsVirtualization/Sandbox Evasion3SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol11Manipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonModify Registry1Cached Domain CredentialsProcess Discovery2VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsVirtualization/Sandbox Evasion3DCSyncApplication Window Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobProcess Injection12Proc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 322271 Sample: PO456789.exe Startdate: 24/11/2020 Architecture: WINDOWS Score: 100 82 Found malware configuration 2->82 84 Malicious sample detected (through community Yara rule) 2->84 86 Sigma detected: Scheduled temp file as task from temp location 2->86 88 9 other signatures 2->88 10 PO456789.exe 2 2->10         started        13 fifyt.exe 2->13         started        15 InstallUtil.exe 2->15         started        17 dhcpmon.exe 2->17         started        process3 signatures4 96 Hides that the sample has been downloaded from the Internet (zone.identifier) 10->96 19 cmd.exe 1 10->19         started        21 cmd.exe 2 10->21         started        24 InstallUtil.exe 13->24         started        26 conhost.exe 15->26         started        28 conhost.exe 17->28         started        process5 file6 30 fifyt.exe 1 19->30         started        33 conhost.exe 19->33         started        70 C:\Users\user\AppData\Local\fifyt.exe, PE32 21->70 dropped 35 conhost.exe 21->35         started        process7 signatures8 98 Hides that the sample has been downloaded from the Internet (zone.identifier) 30->98 37 InstallUtil.exe 1 11 30->37         started        42 cmd.exe 1 30->42         started        44 cmd.exe 1 30->44         started        46 5 other processes 30->46 process9 dnsIp10 78 smithcity123.ddns.net 105.112.96.12, 57689 VNL1-ASNG Nigeria 37->78 80 185.244.30.212, 49765, 49766, 49767 DAVID_CRAIGGG Netherlands 37->80 72 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 37->72 dropped 74 C:\Users\user\AppData\Local\...\tmpC4E7.tmp, XML 37->74 dropped 76 C:\Program Files (x86)\...\dhcpmon.exe, PE32 37->76 dropped 90 Protects its processes via BreakOnTermination flag 37->90 92 Hides that the sample has been downloaded from the Internet (zone.identifier) 37->92 48 schtasks.exe 37->48         started        50 schtasks.exe 37->50         started        94 Uses cmd line tools excessively to alter registry or file data 42->94 52 conhost.exe 42->52         started        54 reg.exe 1 1 42->54         started        56 conhost.exe 44->56         started        58 reg.exe 1 44->58         started        60 conhost.exe 46->60         started        62 reg.exe 46->62         started        64 8 other processes 46->64 file11 signatures12 process13 process14 66 conhost.exe 48->66         started        68 conhost.exe 50->68         started       

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      No Antivirus matches

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      9.2.InstallUtil.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
      9.2.InstallUtil.exe.62c0000.4.unpack100%AviraTR/NanoCore.fadteDownload File
      32.2.InstallUtil.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

      Domains

      No Antivirus matches

      URLs

      No Antivirus matches

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      smithcity123.ddns.net
      105.112.96.12
      truetrue
        unknown

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        185.244.30.212
        unknownNetherlands
        209623DAVID_CRAIGGGtrue
        105.112.96.12
        unknownNigeria
        36873VNL1-ASNGtrue

        General Information

        Joe Sandbox Version:31.0.0 Red Diamond
        Analysis ID:322271
        Start date:24.11.2020
        Start time:20:29:45
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 11m 40s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:PO456789.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:40
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@220/11@6/2
        EGA Information:Failed
        HDC Information:
        • Successful, ratio: 0.6% (good quality ratio 0.3%)
        • Quality average: 39.3%
        • Quality standard deviation: 41.2%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        Warnings:
        Show All
        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
        • Exclude process from analysis (whitelisted): backgroundTaskHost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 40.88.32.150, 13.88.21.125, 51.104.144.132, 93.184.221.240, 52.155.217.156, 20.54.26.129, 92.122.213.247, 92.122.213.194, 51.11.168.160
        • Excluded domains from analysis (whitelisted): displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, arc.msn.com.nsatc.net, wu.ec.azureedge.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, skypedataprdcoleus15.cloudapp.net, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, wu.wpc.apr-52dd2.edgecastdns.net, skypedataprdcolwus15.cloudapp.net, au-bg-shim.trafficmanager.net
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        20:30:46AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run fiffyt C:\Users\user\AppData\Local\fifyt.exe
        20:30:52Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" s>$(Arg0)
        20:30:52API Interceptor923x Sleep call for process: InstallUtil.exe modified
        20:30:54Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
        20:30:54AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        20:31:02AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run fiffyt C:\Users\user\AppData\Local\fifyt.exe

        Joe Sandbox View / Context

        IPs

        No context

        Domains

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        smithcity123.ddns.netFXlRSXcN37.exeGet hashmaliciousBrowse
        • 185.165.153.124

        ASN

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        DAVID_CRAIGGGkelvinx.exeGet hashmaliciousBrowse
        • 185.140.53.132
        Order-2311.exeGet hashmaliciousBrowse
        • 91.193.75.147
        YZD221120.exeGet hashmaliciousBrowse
        • 91.193.75.147
        ORDER #201120A.exeGet hashmaliciousBrowse
        • 185.244.30.92
        oUI0jQS8xQ.exeGet hashmaliciousBrowse
        • 185.140.53.149
        Quotation ATB-PR28500KINH.exeGet hashmaliciousBrowse
        • 185.140.53.139
        Quotation ATB-PR28500KINH.exeGet hashmaliciousBrowse
        • 185.140.53.139
        Ups file de.exeGet hashmaliciousBrowse
        • 185.140.53.221
        NyUnwsFSCa.exeGet hashmaliciousBrowse
        • 185.140.53.149
        purchase order.exeGet hashmaliciousBrowse
        • 185.140.53.233
        Remittance Details.xlsGet hashmaliciousBrowse
        • 185.140.53.184
        PaymentConfirmation.exeGet hashmaliciousBrowse
        • 185.140.53.183
        ORDER #02676.doc.exeGet hashmaliciousBrowse
        • 185.244.30.92
        b11305c6ab207f830062f80eeec728c4.exeGet hashmaliciousBrowse
        • 185.140.53.233
        ShippingDoc.jarGet hashmaliciousBrowse
        • 185.244.30.139
        1kn1ejwPxi.exeGet hashmaliciousBrowse
        • 185.140.53.132
        D6vy84I7rJ.exeGet hashmaliciousBrowse
        • 185.140.53.149
        7iatifHQEp.exeGet hashmaliciousBrowse
        • 185.140.53.132
        Sbext4ZNBq.exeGet hashmaliciousBrowse
        • 185.140.53.197
        xEdiPz1bC3.exeGet hashmaliciousBrowse
        • 185.140.53.234
        VNL1-ASNGDHL_10177_R293_DOCUMENT.exeGet hashmaliciousBrowse
        • 105.112.101.201
        ibgcrnNmhB.exeGet hashmaliciousBrowse
        • 105.112.25.130
        purchase order.exeGet hashmaliciousBrowse
        • 105.112.25.74
        packing list.xlsx.exeGet hashmaliciousBrowse
        • 105.112.69.142
        9087654.exeGet hashmaliciousBrowse
        • 105.112.101.151
        RFQ.exeGet hashmaliciousBrowse
        • 105.112.100.239
        LOI.exeGet hashmaliciousBrowse
        • 105.112.100.239
        corporate-tax.exeGet hashmaliciousBrowse
        • 105.112.101.84
        QUOTATION - COVID 19 PROTECTION SOLUTIONS - final.exeGet hashmaliciousBrowse
        • 105.112.124.8
        BDH9YAC4aQ.exeGet hashmaliciousBrowse
        • 105.112.101.125
        JBIY8HTthL.exeGet hashmaliciousBrowse
        • 105.112.101.125
        late-payment.exeGet hashmaliciousBrowse
        • 105.112.45.74
        Doc0_01210_72820.exeGet hashmaliciousBrowse
        • 105.112.100.246
        newageGet hashmaliciousBrowse
        • 105.120.247.26
        54PDF Enclosed October Order.exeGet hashmaliciousBrowse
        • 105.112.32.190
        47PDF Enclosed PO.exeGet hashmaliciousBrowse
        • 105.112.42.182
        Packing List Detail.exeGet hashmaliciousBrowse
        • 105.112.37.223
        5INQUIRY.exeGet hashmaliciousBrowse
        • 105.112.96.111
        20New Enquiry.exeGet hashmaliciousBrowse
        • 105.112.98.252
        PDF.Order#P.O.3041.exeGet hashmaliciousBrowse
        • 105.112.96.11

        JA3 Fingerprints

        No context

        Dropped Files

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe31.exeGet hashmaliciousBrowse
          ORDER FORM DENK.exeGet hashmaliciousBrowse
            niMONOdcTZ.exeGet hashmaliciousBrowse
              XiCfDFLACR.exeGet hashmaliciousBrowse
                Q7kSO3iJN3.exeGet hashmaliciousBrowse
                  BL, Invoices.exeGet hashmaliciousBrowse
                    crypt.exeGet hashmaliciousBrowse
                      IEcYhddAMD.exeGet hashmaliciousBrowse
                        FRI5A2QZI7.exeGet hashmaliciousBrowse
                          kM16L0Vybr.exeGet hashmaliciousBrowse
                            SecuriteInfo.com.Generic.mg.e1df690a980825ac.exeGet hashmaliciousBrowse
                              9SI5dPQJ7G.exeGet hashmaliciousBrowse
                                FH11m70Scj.exeGet hashmaliciousBrowse
                                  http://cdn.discordapp.com/attachments/776234221668270104/776349109195898880/AWB_DHL733918737WA56301224799546260.pdf.7zGet hashmaliciousBrowse
                                    bKs9QjrX1q.exeGet hashmaliciousBrowse
                                      Y7ET38qc5y.exeGet hashmaliciousBrowse
                                        IIOCxnn1ho.exeGet hashmaliciousBrowse
                                          Jn3wr6uaNK.exeGet hashmaliciousBrowse
                                            ODoXtvoj7j.exeGet hashmaliciousBrowse
                                              jG1KyDSHKK.exeGet hashmaliciousBrowse

                                                Created / dropped Files

                                                C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):41064
                                                Entropy (8bit):6.164873449128079
                                                Encrypted:false
                                                SSDEEP:384:FtpFVLK0MsihB9VKS7xdgE7KJ9Yl6dnPU3SERztmbqCJstdMardz/JikPZ+sPZTd:ZBMs2SqdD86Iq8gZZFyViML3an
                                                MD5:EFEC8C379D165E3F33B536739AEE26A3
                                                SHA1:C875908ACBA5CAC1E0B40F06A83F0F156A2640FA
                                                SHA-256:46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
                                                SHA-512:497847EC115D9AF78899E6DC20EC32A60B16954F83CF5169A23DD3F1459CB632DAC95417BD898FD1895C9FE2262FCBF7838FCF6919FB3B851A0557FBE07CCFFA
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Joe Sandbox View:
                                                • Filename: 31.exe, Detection: malicious, Browse
                                                • Filename: ORDER FORM DENK.exe, Detection: malicious, Browse
                                                • Filename: niMONOdcTZ.exe, Detection: malicious, Browse
                                                • Filename: XiCfDFLACR.exe, Detection: malicious, Browse
                                                • Filename: Q7kSO3iJN3.exe, Detection: malicious, Browse
                                                • Filename: BL, Invoices.exe, Detection: malicious, Browse
                                                • Filename: crypt.exe, Detection: malicious, Browse
                                                • Filename: IEcYhddAMD.exe, Detection: malicious, Browse
                                                • Filename: FRI5A2QZI7.exe, Detection: malicious, Browse
                                                • Filename: kM16L0Vybr.exe, Detection: malicious, Browse
                                                • Filename: SecuriteInfo.com.Generic.mg.e1df690a980825ac.exe, Detection: malicious, Browse
                                                • Filename: 9SI5dPQJ7G.exe, Detection: malicious, Browse
                                                • Filename: FH11m70Scj.exe, Detection: malicious, Browse
                                                • Filename: , Detection: malicious, Browse
                                                • Filename: bKs9QjrX1q.exe, Detection: malicious, Browse
                                                • Filename: Y7ET38qc5y.exe, Detection: malicious, Browse
                                                • Filename: IIOCxnn1ho.exe, Detection: malicious, Browse
                                                • Filename: Jn3wr6uaNK.exe, Detection: malicious, Browse
                                                • Filename: ODoXtvoj7j.exe, Detection: malicious, Browse
                                                • Filename: jG1KyDSHKK.exe, Detection: malicious, Browse
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z..............0..T...........r... ........@.. ....................................`.................................4r..O....................b..h>...........p............................................... ............... ..H............text....R... ...T.................. ..`.rsrc................V..............@..@.reloc...............`..............@..B................hr......H........"..|J..........lm.......o......................................2~.....o....*.r...p(....*VrK..p(....s.........*..0..........(....(....o....o....(....o.... .....T(....o....(....o....o ...o!....4(....o....(....o....o ...o".....(....rm..ps#...o....($........(%....o&....ry..p......%.r...p.%.(.....(....('....((.......o)...('........*.*................"..(*...*..{Q...-...}Q.....(+...(....(,....(+...*"..(-...*..(....*..(.....r...p.(/...o0...s....}T...*....0.. .......~S...-.s
                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.log
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):329
                                                Entropy (8bit):5.324195011891804
                                                Encrypted:false
                                                SSDEEP:6:Q3La/xwc1K9rDLIP12MUAvvr3tDLIP12MUAvvR+uTL2LDY3U21v:Q3La/h1K9rDLI4M9tDLI4MWuPk21v
                                                MD5:0F3825E2D8885E05820523A5D8DFEF9C
                                                SHA1:E6AA2D5D00CE5F875C75B9490F21F2D6B3F0DED3
                                                SHA-256:2F3769543004FF49CB3B6EF06AC5FD6A402DB0C2546E365639338CA2F4049EBE
                                                SHA-512:D8FBAEEABF2D33EAF4FF5AADEBF86C233145502560A42B88EBDE455AE2B001F52728E4CE6C59DBCCA37CBF25BA485F5FC5527E992AB66957C6252CF1956F237C
                                                Malicious:false
                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Configuration.Install, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..
                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO456789.exe.log
                                                Process:C:\Users\user\Desktop\PO456789.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1546
                                                Entropy (8bit):5.346743488670314
                                                Encrypted:false
                                                SSDEEP:48:MxHKXeHKlEHU0YHKhQnouHIW7HKjovjHKx1qHj:iqXeqm00YqhQnouRqjorqxwD
                                                MD5:EC192028815A73A0E57822511039BF45
                                                SHA1:56B71389DEC83E8077FC8AF6DA490430EA64190F
                                                SHA-256:3827EF46D6BAB96F1ABAEAEFF5ABF04569543CD10E8AA6113B4DB419D6E5B03E
                                                SHA-512:0CBDE42DF33CC0B5CE880A14996F7F7ACA6BA398468952A609046BA7E37243554B04E4B7856CC1318333AC142B8D432D4B1BF2A0434E12BF80387A671F64B991
                                                Malicious:false
                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):329
                                                Entropy (8bit):5.324195011891804
                                                Encrypted:false
                                                SSDEEP:6:Q3La/xwc1K9rDLIP12MUAvvr3tDLIP12MUAvvR+uTL2LDY3U21v:Q3La/h1K9rDLI4M9tDLI4MWuPk21v
                                                MD5:0F3825E2D8885E05820523A5D8DFEF9C
                                                SHA1:E6AA2D5D00CE5F875C75B9490F21F2D6B3F0DED3
                                                SHA-256:2F3769543004FF49CB3B6EF06AC5FD6A402DB0C2546E365639338CA2F4049EBE
                                                SHA-512:D8FBAEEABF2D33EAF4FF5AADEBF86C233145502560A42B88EBDE455AE2B001F52728E4CE6C59DBCCA37CBF25BA485F5FC5527E992AB66957C6252CF1956F237C
                                                Malicious:false
                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Configuration.Install, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..
                                                C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1324
                                                Entropy (8bit):5.130789568721151
                                                Encrypted:false
                                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mlxtn:cbk4oL600QydbQxIYODOLedq3Zlj
                                                MD5:576BBAF398045C3843D452EC83208236
                                                SHA1:8ED5B2500AE7A40CBFA6E9018A1D1F1E70CB1374
                                                SHA-256:33C0C2D72FA383E5988CE640FEBC5AC6A2BD71D4AE660B99E52234952E17467B
                                                SHA-512:E7CC0EA0B351C6A8618E14F03C00E88EF83E2F169E0B4D66513F580F0A9352FBFE429E57186362B69407150D566BBDADCA2F7B574FC748CC140B3249BE67F96A
                                                Malicious:true
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                C:\Users\user\AppData\Local\Temp\tmpC96C.tmp
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1310
                                                Entropy (8bit):5.109425792877704
                                                Encrypted:false
                                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                Malicious:false
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                C:\Users\user\AppData\Local\fifyt.exe
                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):595456
                                                Entropy (8bit):6.277264014356029
                                                Encrypted:false
                                                SSDEEP:12288:Gn5PqttqmMwFHo3ggmmz7dBfRdGacGJQb+oT8:YlqSmMwFHQggvzBBfRdGac+
                                                MD5:6997FBDA2B03AC3C34FEC92ED6375E40
                                                SHA1:4D16DE6B50332CC05FCA066125937C364DDA961F
                                                SHA-256:6ED6AEBE6D0B839AB5A5BEBAD7D58D72445146AFA8EE9742F9B0E287F007B3C4
                                                SHA-512:C10EFA2A625D3BCCD43B81BC9EDFF5CA43FF9B6D57E8185C111DA7496FC0CDB23706DE9CEA1D8ADD20ECB7B1F252290DA68C3A37A73585C1419C8C56B6C574AC
                                                Malicious:true
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......D............................n*... ...@....@.. ....................................`..................................*..O....@.......................`....................................................... ............... ..H............text...t.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................P*......H............*......V......&\...........................................z....;y....E.(Z..l........X8...F.5._.[{.....Q..l./...FQ.ED......2...f...AU...[......>tM.S<....>.o.f........1(aPs..X.B.z.].'J...$.i._Dp.....>.f.Z....C!.....s..b+N..+.....2&...n6.R..e'.......n.(....#...?qt....d.?.Uq./T...k<Wu....k....A..-.....c... s>>F..P...{.N.a\..3.....`|...{.'^@.S...+_`..7.........9......'u \...P.0$..E}..y..O.....eL...\.z.^fB&....bW.o.9.6....cm.....tG.C..\.RG.H..
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                File Type:Non-ISO extended-ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):8
                                                Entropy (8bit):3.0
                                                Encrypted:false
                                                SSDEEP:3:GXK3tn:AKdn
                                                MD5:274BB67DF1F631159FB981CAE1616E40
                                                SHA1:F87AEE2FB9B9568ECF78E441AE04EEC5AB9CF4BC
                                                SHA-256:EEB9380E9350BDDEDB8BE2332F7A9AC5D08732853279AED361B55DA0933CE9D6
                                                SHA-512:1ABFA469868A8F3AAF96646CC58C179CD7393A38B83B80C29C7B149AD76D0C648898F8631790F48A8D28164C672FB5EB3C02EB167AD2500C398302718F7B8064
                                                Malicious:true
                                                Preview: o..r...H
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):61
                                                Entropy (8bit):4.84649200170358
                                                Encrypted:false
                                                SSDEEP:3:oMty8WddSNARI0dAn:oMLW6qRndA
                                                MD5:1EFF0939B507F9B297DCB06A4C0413B8
                                                SHA1:8131E01D9969CD60A0241E71727E56749AB53B31
                                                SHA-256:C8BBFDF650E881719F8E623E5FF54AAFE25B64B351E44077B511071AB08AE903
                                                SHA-512:81E8AE0346984643A56CA92323F7687E648130AB61A5AA8E4706DD1B2FC56B1974C06923003343B53391E1018D07BA5090222899F5FA4F4F8327995763BF84FE
                                                Malicious:false
                                                Preview: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                \Device\ConDrv
                                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):359
                                                Entropy (8bit):4.8928974699064005
                                                Encrypted:false
                                                SSDEEP:6:zx3M7bWXRLuRc4LQtUmYRZBXVNYxxEQgz3MBL3RgKRLLyqbbUcfvfAL/BM7GRJpF:zKnWXQRzA4BFNYxx5ggBDX7HfvfU66rF
                                                MD5:1CEB9B01195234DD4E4CEBEFC4425CA6
                                                SHA1:674D41B247D4F20F5C0F04DF476539555FD94EED
                                                SHA-256:9A941C6BA5D12DF1D05D345125CA38DCA56C2BE4FF4FEF02B29C4B4F4E67B433
                                                SHA-512:0FCDF334529F9F659D53666EE4F33216A6BB58E52BDA61181A0E7EC75FDD1FA8A681C4FA8CC671372D7F8089AD94C7C12DCA85BBC50A2182C265D79AFEC4796C
                                                Malicious:false
                                                Preview: Microsoft (R) .NET Framework Installation utility Version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....Exception occurred while initializing the installation:..System.IO.FileNotFoundException: Could not load file or assembly 'file:///C:\Windows\system32\0' or one of its dependencies. The system cannot find the file specified....

                                                Static File Info

                                                General

                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):6.277264014356029
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                • DOS Executable Generic (2002/1) 0.01%
                                                File name:PO456789.exe
                                                File size:595456
                                                MD5:6997fbda2b03ac3c34fec92ed6375e40
                                                SHA1:4d16de6b50332cc05fca066125937c364dda961f
                                                SHA256:6ed6aebe6d0b839ab5a5bebad7d58d72445146afa8ee9742f9b0e287f007b3c4
                                                SHA512:c10efa2a625d3bccd43b81bc9edff5ca43ff9b6d57e8185c111da7496fc0cdb23706de9cea1d8add20ecb7b1f252290da68c3a37a73585c1419c8c56b6c574ac
                                                SSDEEP:12288:Gn5PqttqmMwFHo3ggmmz7dBfRdGacGJQb+oT8:YlqSmMwFHQggvzBBfRdGac+
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......D............................n*... ...@....@.. ....................................`................................

                                                File Icon

                                                Icon Hash:00828e8e8686b000

                                                Static PE Info

                                                General

                                                Entrypoint:0x492a6e
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                Time Stamp:0x44ECE4BC [Wed Aug 23 23:29:00 2006 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:v4.0.30319
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                Entrypoint Preview

                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al

                                                Data Directories

                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x92a1c0x4f.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x940000x596.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x960000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                Sections

                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000x90a740x90c00False0.590951870142data6.28617887105IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                .rsrc0x940000x5960x600False0.4140625data4.06252531054IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x960000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                Resources

                                                NameRVASizeTypeLanguageCountry
                                                RT_VERSION0x940a00x30cdata
                                                RT_MANIFEST0x943ac0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                Imports

                                                DLLImport
                                                mscoree.dll_CorExeMain

                                                Version Infos

                                                DescriptionData
                                                Translation0x0000 0x04b0
                                                LegalCopyrightCopyright 2020
                                                Assembly Version1.0.0.0
                                                InternalNameStub37.exe
                                                FileVersion1.0.0.0
                                                CompanyName
                                                LegalTrademarks
                                                Comments
                                                ProductNameStub37
                                                ProductVersion1.0.0.0
                                                FileDescriptionStub37
                                                OriginalFilenameStub37.exe

                                                Network Behavior

                                                Network Port Distribution

                                                TCP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Nov 24, 2020 20:30:54.693972111 CET4973357689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:30:57.750633955 CET4973357689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:31:03.915282011 CET4973357689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:31:12.010874033 CET4974157689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:31:15.025546074 CET4974157689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:31:21.026057005 CET4974157689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:31:29.038765907 CET4975457689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:31:32.042599916 CET4975457689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:31:38.074345112 CET4975457689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:31:45.705604076 CET4976557689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:45.764708042 CET5768949765185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:31:46.278141022 CET4976557689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:46.337778091 CET5768949765185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:31:46.840739012 CET4976557689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:46.900777102 CET5768949765185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:31:51.232747078 CET4976657689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:51.292907000 CET5768949766185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:31:51.794209957 CET4976657689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:51.854765892 CET5768949766185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:31:52.357130051 CET4976657689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:52.416743040 CET5768949766185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:31:56.420990944 CET4976757689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:56.480937958 CET5768949767185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:31:56.982134104 CET4976757689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:57.041433096 CET5768949767185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:31:57.545876980 CET4976757689192.168.2.4185.244.30.212
                                                Nov 24, 2020 20:31:57.605487108 CET5768949767185.244.30.212192.168.2.4
                                                Nov 24, 2020 20:32:01.706033945 CET4976857689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:32:04.701545954 CET4976857689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:32:10.702197075 CET4976857689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:32:18.344161987 CET4977357689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:32:21.359322071 CET4977357689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:32:27.359617949 CET4977357689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:32:35.016170979 CET4977457689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:32:38.016824007 CET4977457689192.168.2.4105.112.96.12
                                                Nov 24, 2020 20:32:44.017311096 CET4977457689192.168.2.4105.112.96.12

                                                UDP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Nov 24, 2020 20:30:44.678797007 CET4991053192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:44.705682993 CET53499108.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:45.484963894 CET5585453192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:45.511976957 CET53558548.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:46.542421103 CET6454953192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:46.569574118 CET53645498.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:53.437715054 CET6315353192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:53.464725018 CET53631538.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:54.643064976 CET5299153192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:54.680453062 CET53529918.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:54.845729113 CET5370053192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:54.872944117 CET53537008.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:57.835988998 CET5172653192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:57.871826887 CET53517268.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:58.538731098 CET5679453192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:58.565850973 CET53567948.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:58.579524040 CET5653453192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:58.606662035 CET53565348.8.8.8192.168.2.4
                                                Nov 24, 2020 20:30:59.639020920 CET5662753192.168.2.48.8.8.8
                                                Nov 24, 2020 20:30:59.674792051 CET53566278.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:03.403490067 CET5662153192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:03.469991922 CET53566218.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:11.971190929 CET6311653192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:12.008527994 CET53631168.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:19.328739882 CET6407853192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:19.355988026 CET53640788.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:19.775859118 CET6480153192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:19.802894115 CET53648018.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:20.135490894 CET6172153192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:20.171039104 CET53617218.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:20.777755022 CET5125553192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:20.818367958 CET53512558.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:21.131675959 CET6152253192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:21.167100906 CET53615228.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:21.787940979 CET5233753192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:21.823509932 CET53523378.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:22.114726067 CET5504653192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:22.141712904 CET53550468.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:22.455543995 CET4961253192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:22.490964890 CET53496128.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:22.878814936 CET4928553192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:22.914417982 CET53492858.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:23.341555119 CET5060153192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:23.368742943 CET53506018.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:23.615839005 CET6087553192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:23.618319988 CET5644853192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:23.642846107 CET53608758.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:23.664068937 CET53564488.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:28.986315966 CET5917253192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:29.021948099 CET53591728.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:35.705284119 CET6242053192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:35.732440948 CET53624208.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:37.506514072 CET6057953192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:37.543237925 CET53605798.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:38.117646933 CET5018353192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:38.144689083 CET53501838.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:39.269773960 CET6153153192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:39.296787977 CET53615318.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:39.942400932 CET4922853192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:39.969536066 CET53492288.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:40.963196993 CET5979453192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:40.990212917 CET53597948.8.8.8192.168.2.4
                                                Nov 24, 2020 20:31:41.633445978 CET5591653192.168.2.48.8.8.8
                                                Nov 24, 2020 20:31:41.660645008 CET53559168.8.8.8192.168.2.4
                                                Nov 24, 2020 20:32:01.647542000 CET5275253192.168.2.48.8.8.8
                                                Nov 24, 2020 20:32:01.686784983 CET53527528.8.8.8192.168.2.4
                                                Nov 24, 2020 20:32:06.878326893 CET6054253192.168.2.48.8.8.8
                                                Nov 24, 2020 20:32:06.905380011 CET53605428.8.8.8192.168.2.4
                                                Nov 24, 2020 20:32:07.612168074 CET6068953192.168.2.48.8.8.8
                                                Nov 24, 2020 20:32:07.648063898 CET53606898.8.8.8192.168.2.4
                                                Nov 24, 2020 20:32:11.721676111 CET6420653192.168.2.48.8.8.8
                                                Nov 24, 2020 20:32:11.748917103 CET53642068.8.8.8192.168.2.4
                                                Nov 24, 2020 20:32:12.806418896 CET5090453192.168.2.48.8.8.8
                                                Nov 24, 2020 20:32:12.844140053 CET53509048.8.8.8192.168.2.4
                                                Nov 24, 2020 20:32:18.290870905 CET5752553192.168.2.48.8.8.8
                                                Nov 24, 2020 20:32:18.330842972 CET53575258.8.8.8192.168.2.4
                                                Nov 24, 2020 20:32:34.979161978 CET5381453192.168.2.48.8.8.8
                                                Nov 24, 2020 20:32:35.014664888 CET53538148.8.8.8192.168.2.4

                                                DNS Queries

                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                Nov 24, 2020 20:30:54.643064976 CET192.168.2.48.8.8.80xd467Standard query (0)smithcity123.ddns.netA (IP address)IN (0x0001)
                                                Nov 24, 2020 20:31:11.971190929 CET192.168.2.48.8.8.80xb0cbStandard query (0)smithcity123.ddns.netA (IP address)IN (0x0001)
                                                Nov 24, 2020 20:31:28.986315966 CET192.168.2.48.8.8.80x1b84Standard query (0)smithcity123.ddns.netA (IP address)IN (0x0001)
                                                Nov 24, 2020 20:32:01.647542000 CET192.168.2.48.8.8.80x37f5Standard query (0)smithcity123.ddns.netA (IP address)IN (0x0001)
                                                Nov 24, 2020 20:32:18.290870905 CET192.168.2.48.8.8.80x91dcStandard query (0)smithcity123.ddns.netA (IP address)IN (0x0001)
                                                Nov 24, 2020 20:32:34.979161978 CET192.168.2.48.8.8.80x43e2Standard query (0)smithcity123.ddns.netA (IP address)IN (0x0001)

                                                DNS Answers

                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                Nov 24, 2020 20:30:54.680453062 CET8.8.8.8192.168.2.40xd467No error (0)smithcity123.ddns.net105.112.96.12A (IP address)IN (0x0001)
                                                Nov 24, 2020 20:31:12.008527994 CET8.8.8.8192.168.2.40xb0cbNo error (0)smithcity123.ddns.net105.112.96.12A (IP address)IN (0x0001)
                                                Nov 24, 2020 20:31:29.021948099 CET8.8.8.8192.168.2.40x1b84No error (0)smithcity123.ddns.net105.112.96.12A (IP address)IN (0x0001)
                                                Nov 24, 2020 20:32:01.686784983 CET8.8.8.8192.168.2.40x37f5No error (0)smithcity123.ddns.net105.112.96.12A (IP address)IN (0x0001)
                                                Nov 24, 2020 20:32:18.330842972 CET8.8.8.8192.168.2.40x91dcNo error (0)smithcity123.ddns.net105.112.96.12A (IP address)IN (0x0001)
                                                Nov 24, 2020 20:32:35.014664888 CET8.8.8.8192.168.2.40x43e2No error (0)smithcity123.ddns.net105.112.96.12A (IP address)IN (0x0001)

                                                Code Manipulations

                                                Statistics

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:20:30:34
                                                Start date:24/11/2020
                                                Path:C:\Users\user\Desktop\PO456789.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Users\user\Desktop\PO456789.exe'
                                                Imagebase:0xa10000
                                                File size:595456 bytes
                                                MD5 hash:6997FBDA2B03AC3C34FEC92ED6375E40
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.667325612.00000000047CF000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.666493336.00000000046D1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                Reputation:low

                                                General

                                                Start time:20:30:37
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c copy 'C:\Users\user\Desktop\PO456789.exe' 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:38
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:39
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c, 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:40
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:40
                                                Start date:24/11/2020
                                                Path:C:\Users\user\AppData\Local\fifyt.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Users\user\AppData\Local\fifyt.exe
                                                Imagebase:0x1c0000
                                                File size:595456 bytes
                                                MD5 hash:6997FBDA2B03AC3C34FEC92ED6375E40
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.919007520.0000000003EFF000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.918869911.0000000003E01000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                Reputation:low

                                                General

                                                Start time:20:30:44
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:44
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:45
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\reg.exe
                                                Wow64 process (32bit):true
                                                Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x1120000
                                                File size:59392 bytes
                                                MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:46
                                                Start date:24/11/2020
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                Imagebase:0x860000
                                                File size:41064 bytes
                                                MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.916744758.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.922011910.0000000005530000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.922011910.0000000005530000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.918066264.0000000002AF1000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.918936190.0000000003B39000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.922273053.00000000062C0000.00000004.00000001.sdmp, Author: Joe Security
                                                Reputation:moderate

                                                General

                                                Start time:20:30:46
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:46
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:47
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\reg.exe
                                                Wow64 process (32bit):true
                                                Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x1120000
                                                File size:59392 bytes
                                                MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:48
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:49
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:20:30:49
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpC4E7.tmp'
                                                Imagebase:0xf40000
                                                File size:185856 bytes
                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:49
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\reg.exe
                                                Wow64 process (32bit):true
                                                Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x1120000
                                                File size:59392 bytes
                                                MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:50
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:50
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmpC96C.tmp'
                                                Imagebase:0xf40000
                                                File size:185856 bytes
                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:51
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:52
                                                Start date:24/11/2020
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe 0
                                                Imagebase:0x870000
                                                File size:41064 bytes
                                                MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET

                                                General

                                                Start time:20:30:52
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:53
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:53
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:54
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\reg.exe
                                                Wow64 process (32bit):true
                                                Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x1120000
                                                File size:59392 bytes
                                                MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:54
                                                Start date:24/11/2020
                                                Path:C:\Users\user\AppData\Local\fifyt.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x860000
                                                File size:595456 bytes
                                                MD5 hash:6997FBDA2B03AC3C34FEC92ED6375E40
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 0000001A.00000002.918889108.0000000004521000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 0000001A.00000002.919031483.000000000461F000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                                                General

                                                Start time:20:30:54
                                                Start date:24/11/2020
                                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                Imagebase:0x250000
                                                File size:41064 bytes
                                                MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Antivirus matches:
                                                • Detection: 0%, Metadefender, Browse
                                                • Detection: 0%, ReversingLabs

                                                General

                                                Start time:20:30:55
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:55
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:56
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:56
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\reg.exe
                                                Wow64 process (32bit):true
                                                Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x1120000
                                                File size:59392 bytes
                                                MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:57
                                                Start date:24/11/2020
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                Imagebase:0x520000
                                                File size:41064 bytes
                                                MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000020.00000002.721312091.0000000003899000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000002.720376999.0000000002891000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000020.00000002.720376999.0000000002891000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000020.00000002.719448069.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>

                                                General

                                                Start time:20:30:58
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:59
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:30:59
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\reg.exe
                                                Wow64 process (32bit):true
                                                Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x1120000
                                                File size:59392 bytes
                                                MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:31:01
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Windows\System32\cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x11d0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:31:01
                                                Start date:24/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff724c50000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:20:31:02
                                                Start date:24/11/2020
                                                Path:C:\Windows\SysWOW64\reg.exe
                                                Wow64 process (32bit):true
                                                Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'fiffyt' /t REG_SZ /d 'C:\Users\user\AppData\Local\fifyt.exe'
                                                Imagebase:0x1120000
                                                File size:59392 bytes
                                                MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                Disassembly

                                                Code Analysis

                                                Reset < >