Loading ...

Play interactive tourEdit tour

Analysis Report ORDER PMX-PT-2001 STOCK+NOVO.exe

Overview

General Information

Sample Name:ORDER PMX-PT-2001 STOCK+NOVO.exe
Analysis ID:323078
MD5:ce724d85d4615439ff27f5573c9aaa8f
SHA1:5de819c63b446cf675c69376c9d7ec478dea9060
SHA256:7534a4ffb8ef83103485bcce9d51b2af93730a9d578e2b8b5f7ff473c0f8092d
Tags:exeNanoCoreRAT

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM_3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • ORDER PMX-PT-2001 STOCK+NOVO.exe (PID: 7136 cmdline: 'C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exe' MD5: CE724D85D4615439FF27F5573C9AAA8F)
    • schtasks.exe (PID: 5776 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\OBtaLehuZHtd' /XML 'C:\Users\user\AppData\Local\Temp\tmp1BEF.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • MSBuild.exe (PID: 4544 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe MD5: 88BBB7610152B48C2B3879473B17857E)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.592799411.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000003.00000002.592799411.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000003.00000002.592799411.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    00000000.00000002.360073804.0000000003FDD000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1109d:$x1: NanoCore.ClientPluginHost
    • 0x438bd:$x1: NanoCore.ClientPluginHost
    • 0x110da:$x2: IClientNetworkHost
    • 0x438fa:$x2: IClientNetworkHost
    • 0x14c0d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x4742d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000000.00000002.360073804.0000000003FDD000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 17 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      3.2.MSBuild.exe.5960000.4.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xd9ad:$x1: NanoCore.ClientPluginHost
      • 0xd9da:$x2: IClientNetworkHost
      3.2.MSBuild.exe.5960000.4.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xd9ad:$x2: NanoCore.ClientPluginHost
      • 0xea88:$s4: PipeCreated
      • 0xd9c7:$s5: IClientLoggingHost
      3.2.MSBuild.exe.5960000.4.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        3.2.MSBuild.exe.54f0000.2.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        3.2.MSBuild.exe.54f0000.2.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe75:$x2: NanoCore.ClientPluginHost
        • 0x1261:$s3: PipeExists
        • 0x1136:$s4: PipeCreated
        • 0xeb0:$s5: IClientLoggingHost
        Click to see the 7 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 4544, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\OBtaLehuZHtd' /XML 'C:\Users\user\AppData\Local\Temp\tmp1BEF.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\OBtaLehuZHtd' /XML 'C:\Users\user\AppData\Local\Temp\tmp1BEF.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exe' , ParentImage: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exe, ParentProcessId: 7136, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\OBtaLehuZHtd' /XML 'C:\Users\user\AppData\Local\Temp\tmp1BEF.tmp', ProcessId: 5776

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\OBtaLehuZHtd.exeVirustotal: Detection: 29%Perma Link
        Multi AV Scanner detection for submitted fileShow sources
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exeVirustotal: Detection: 29%Perma Link
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000003.00000002.592799411.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.360073804.0000000003FDD000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.599041317.0000000005960000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.597422084.00000000041A7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ORDER PMX-PT-2001 STOCK+NOVO.exe PID: 7136, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4544, type: MEMORY
        Source: Yara matchFile source: 3.2.MSBuild.exe.5960000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.MSBuild.exe.5960000.4.raw.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\OBtaLehuZHtd.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exeJoe Sandbox ML: detected
        Source: 3.2.MSBuild.exe.5960000.4.unpackAvira: Label: TR/NanoCore.fadte
        Source: 3.2.MSBuild.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: global trafficTCP traffic: 192.168.2.6:49714 -> 185.157.162.81:40700
        Source: Joe Sandbox ViewIP Address: 185.157.162.81 185.157.162.81
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 2.20.142.210
        Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
        Source: unknownTCP traffic detected without corresponding DNS query: 2.20.142.210
        Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
        Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
        Source: unknownTCP traffic detected without corresponding DNS query: 104.108.60.202
        Source: unknownTCP traffic detected without corresponding DNS query: 104.108.60.202
        Source: unknownTCP traffic detected without corresponding DNS query: 104.108.60.202
        Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
        Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
        Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
        Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
        Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
        Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
        Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
        Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 40.90.22.191
        Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
        Source: unknownTCP traffic detected without corresponding DNS query: 93.184.220.29
        Source: unknownDNS traffic detected: queries for: g.msn.com
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49678
        Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49677
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49686
        Source: unknownNetwork traffic detected: HTTP traffic on port 49677 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49683
        Source: unknownNetwork traffic detected: HTTP traffic on port 49686 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
        Source: MSBuild.exe, 00000003.00000002.599041317.0000000005960000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000003.00000002.592799411.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.360073804.0000000003FDD000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.599041317.0000000005960000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.597422084.00000000041A7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ORDER PMX-PT-2001 STOCK+NOVO.exe PID: 7136, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4544, type: MEMORY
        Source: Yara matchFile source: 3.2.MSBuild.exe.5960000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.MSBuild.exe.5960000.4.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000003.00000002.592799411.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000003.00000002.592799411.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.360073804.0000000003FDD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.360073804.0000000003FDD000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000003.00000002.599041317.0000000005960000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000003.00000002.598672636.00000000054F0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000003.00000002.597422084.00000000041A7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: ORDER PMX-PT-2001 STOCK+NOVO.exe PID: 7136, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: ORDER PMX-PT-2001 STOCK+NOVO.exe PID: 7136, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: MSBuild.exe PID: 4544, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: MSBuild.exe PID: 4544, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.2.MSBuild.exe.5960000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.MSBuild.exe.54f0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 3.2.MSBuild.exe.5960000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: ORDER PMX-PT-2001 STOCK+NOVO.exe
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_0106AB1E NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_0106A9AE NtQueryInformationProcess,
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_0106A98C NtQueryInformationProcess,
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_0106AAE3 NtQuerySystemInformation,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_054C10CA NtQuerySystemInformation,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_054C108F NtQuerySystemInformation,
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_02AE08B0
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_02AE0099
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_02AE183D
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_02AE3074
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_02AE8DF8
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_02AE2900
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_02AE9FA8
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_02AE9FB8
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_02AE33E8
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_02AE33F8
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_02AE08A0
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_02AE28F3
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_02AE19A3
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_02AE8DE9
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_02AEA1FB
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_02AE9178
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_05925C48
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_05920006
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_05925C39
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_05920070
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_05929B20
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_059252D8
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_059252CB
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05393850
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05398F58
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05398358
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0539ABB8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_05392FA8
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_053923A0
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0539901F
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_0539306F
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exeBinary or memory string: OriginalFilename vs ORDER PMX-PT-2001 STOCK+NOVO.exe
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exe, 00000000.00000002.362888953.0000000005F20000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs ORDER PMX-PT-2001 STOCK+NOVO.exe
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exe, 00000000.00000002.365523105.0000000006020000.00000002.00000001.sdmpBinary or memory string: originalfilename vs ORDER PMX-PT-2001 STOCK+NOVO.exe
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exe, 00000000.00000002.365523105.0000000006020000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs ORDER PMX-PT-2001 STOCK+NOVO.exe
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exe, 00000000.00000002.362224387.00000000057D0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameKedermister.dllT vs ORDER PMX-PT-2001 STOCK+NOVO.exe
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exe, 00000000.00000002.360789536.0000000005380000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs ORDER PMX-PT-2001 STOCK+NOVO.exe
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exe, 00000000.00000002.355858899.0000000000692000.00000002.00020000.sdmpBinary or memory string: OriginalFilename2e6s.exeP vs ORDER PMX-PT-2001 STOCK+NOVO.exe
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exeBinary or memory string: OriginalFilename2e6s.exeP vs ORDER PMX-PT-2001 STOCK+NOVO.exe
        Source: 00000003.00000002.592799411.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000003.00000002.592799411.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.360073804.0000000003FDD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.360073804.0000000003FDD000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000003.00000002.599041317.0000000005960000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000003.00000002.599041317.0000000005960000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000003.00000002.598672636.00000000054F0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000003.00000002.598672636.00000000054F0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000003.00000002.597422084.00000000041A7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: ORDER PMX-PT-2001 STOCK+NOVO.exe PID: 7136, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: ORDER PMX-PT-2001 STOCK+NOVO.exe PID: 7136, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: MSBuild.exe PID: 4544, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: MSBuild.exe PID: 4544, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.2.MSBuild.exe.5960000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.2.MSBuild.exe.5960000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.MSBuild.exe.54f0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.2.MSBuild.exe.54f0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 3.2.MSBuild.exe.5960000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 3.2.MSBuild.exe.5960000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 3.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 3.2.MSBuild.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 3.2.MSBuild.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@6/5@4/1
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_0106A65E AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_0106A627 AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_054C0E8A AdjustTokenPrivileges,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_054C0E53 AdjustTokenPrivileges,
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeFile created: C:\Users\user\AppData\Roaming\OBtaLehuZHtd.exeJump to behavior
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{ebbd9300-ed31-4d29-88d8-4f7b7a7f8653}
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5780:120:WilError_01
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeMutant created: \Sessions\1\BaseNamedObjects\aImaDyYoa
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeFile created: C:\Users\user\AppData\Local\Temp\tmp1BEF.tmpJump to behavior
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exeVirustotal: Detection: 29%
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeFile read: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exe 'C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\OBtaLehuZHtd' /XML 'C:\Users\user\AppData\Local\Temp\tmp1BEF.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\OBtaLehuZHtd' /XML 'C:\Users\user\AppData\Local\Temp\tmp1BEF.tmp'
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: mscorrc.pdb source: ORDER PMX-PT-2001 STOCK+NOVO.exe, 00000000.00000002.360789536.0000000005380000.00000002.00000001.sdmp, MSBuild.exe, 00000003.00000002.598762495.0000000005520000.00000002.00000001.sdmp

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 3.2.MSBuild.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 3.2.MSBuild.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_00698320 push edi; ret
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_02AE7565 push edx; retf
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_05928028 push esp; retf
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_014A750C pushad ; retf
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_014A9D30 pushad ; retf
        Source: initial sampleStatic PE information: section name: .text entropy: 7.26187672346
        Source: initial sampleStatic PE information: section name: .text entropy: 7.26187672346
        Source: 3.2.MSBuild.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 3.2.MSBuild.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeFile created: C:\Users\user\AppData\Roaming\OBtaLehuZHtd.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\OBtaLehuZHtd' /XML 'C:\Users\user\AppData\Local\Temp\tmp1BEF.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM_3Show sources
        Source: Yara matchFile source: 00000000.00000002.357258593.0000000002F01000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.357341507.0000000002F8C000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ORDER PMX-PT-2001 STOCK+NOVO.exe PID: 7136, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exe, 00000000.00000002.357258593.0000000002F01000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exe, 00000000.00000002.357258593.0000000002F01000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: threadDelayed 591
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: threadDelayed 863
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: threadDelayed 386
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: foregroundWindowGot 804
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exe TID: 7140Thread sleep time: -50704s >= -30000s
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exe TID: 7156Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 6072Thread sleep time: -1844674407370954s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_054C231E GetSystemInfo,
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exe, 00000000.00000002.357258593.0000000002F01000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: MSBuild.exe, 00000003.00000002.599513915.0000000006220000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exe, 00000000.00000002.357258593.0000000002F01000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exe, 00000000.00000002.357258593.0000000002F01000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II|update users set password = @password where user_id = @user_id
        Source: MSBuild.exe, 00000003.00000002.593733078.0000000001308000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW^L
        Source: MSBuild.exe, 00000003.00000002.599513915.0000000006220000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: MSBuild.exe, 00000003.00000002.599513915.0000000006220000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: MSBuild.exe, 00000003.00000002.593733078.0000000001308000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exe, 00000000.00000002.357258593.0000000002F01000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: MSBuild.exe, 00000003.00000002.599513915.0000000006220000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess token adjusted: Debug
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 400000 value starts with: 4D5A
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 400000
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 402000
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 420000
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: 422000
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: D20008
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\OBtaLehuZHtd' /XML 'C:\Users\user\AppData\Local\Temp\tmp1BEF.tmp'
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
        Source: MSBuild.exe, 00000003.00000002.595744580.0000000003171000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: MSBuild.exe, 00000003.00000002.594332828.0000000001920000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: MSBuild.exe, 00000003.00000002.594332828.0000000001920000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: MSBuild.exe, 00000003.00000002.594332828.0000000001920000.00000002.00000001.sdmpBinary or memory string: &Program Manager
        Source: MSBuild.exe, 00000003.00000002.594332828.0000000001920000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exeCode function: 0_2_0106B912 GetUserNameW,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000003.00000002.592799411.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.360073804.0000000003FDD000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.599041317.0000000005960000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.597422084.00000000041A7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ORDER PMX-PT-2001 STOCK+NOVO.exe PID: 7136, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4544, type: MEMORY
        Source: Yara matchFile source: 3.2.MSBuild.exe.5960000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.MSBuild.exe.5960000.4.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: ORDER PMX-PT-2001 STOCK+NOVO.exe, 00000000.00000002.360073804.0000000003FDD000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: MSBuild.exe, 00000003.00000002.595744580.0000000003171000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: MSBuild.exe, 00000003.00000002.595744580.0000000003171000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000003.00000002.592799411.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.360073804.0000000003FDD000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.599041317.0000000005960000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000003.00000002.597422084.00000000041A7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: ORDER PMX-PT-2001 STOCK+NOVO.exe PID: 7136, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4544, type: MEMORY
        Source: Yara matchFile source: 3.2.MSBuild.exe.5960000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 3.2.MSBuild.exe.5960000.4.raw.unpack, type: UNPACKEDPE
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_054C23BE bind,
        Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 3_2_054C238E bind,

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Access Token Manipulation1Masquerading1Input Capture11Security Software Discovery211Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection212Virtualization/Sandbox Evasion3LSASS MemoryVirtualization/Sandbox Evasion3Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Scheduled Task/Job1Disable or Modify Tools1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection212LSA SecretsAccount Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol2Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsSystem Owner/User Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsHidden Files and Directories1DCSyncFile and Directory Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobObfuscated Files or Information2Proc FilesystemSystem Information Discovery3Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing12/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        ORDER PMX-PT-2001 STOCK+NOVO.exe30%VirustotalBrowse
        ORDER PMX-PT-2001 STOCK+NOVO.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\OBtaLehuZHtd.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Roaming\OBtaLehuZHtd.exe30%VirustotalBrowse

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        3.2.MSBuild.exe.5960000.4.unpack100%AviraTR/NanoCore.fadteDownload File
        3.2.MSBuild.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        No Antivirus matches

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        nanopc.linkpc.net
        185.157.162.81
        truefalse
          high
          g.msn.com
          unknown
          unknownfalse
            high

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            185.157.162.81
            unknownSweden
            197595OBE-EUROPEObenetworkEuropeSEfalse

            General Information

            Joe Sandbox Version:31.0.0 Red Diamond
            Analysis ID:323078
            Start date:26.11.2020
            Start time:09:53:28
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 6m 58s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:ORDER PMX-PT-2001 STOCK+NOVO.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:20
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@6/5@4/1
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 2.7% (good quality ratio 1.9%)
            • Quality average: 41.7%
            • Quality standard deviation: 33.4%
            HCA Information:
            • Successful, ratio: 98%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            Warnings:
            Show All
            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
            • TCP Packets have been reduced to 100
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
            • Excluded IPs from analysis (whitelisted): 13.88.21.125, 51.104.139.180, 40.88.32.150, 52.155.217.156, 20.54.26.129, 67.27.235.126, 67.27.233.254, 8.253.95.120, 8.248.119.254, 8.253.95.249, 8.248.117.254, 67.27.234.126, 67.27.233.126, 51.103.5.186, 92.122.213.194, 92.122.213.247, 52.142.114.176, 13.64.90.137, 23.210.248.85, 104.42.151.234
            • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, wns.notify.windows.com.akadns.net, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, g-msn-com-nsatc.trafficmanager.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcoleus15.cloudapp.net, par02p.wns.notify.windows.com.akadns.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, auto.au.download.windowsupdate.com.c.footprint.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, skypedataprdcolwus17.cloudapp.net, fs.microsoft.com, db3p-ris-pf-prod-atm.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, e1723.g.akamaiedge.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus15.cloudapp.net, skypedataprdcolwus16.cloudapp.net
            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.

            Simulations

            Behavior and APIs

            TimeTypeDescription
            09:54:28API Interceptor1x Sleep call for process: ORDER PMX-PT-2001 STOCK+NOVO.exe modified

            Joe Sandbox View / Context

            IPs

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            185.157.162.81DHL_10177_R293_DOCUMENT.exeGet hashmaliciousBrowse
              Order_List_PO# 081928.pdf.exeGet hashmaliciousBrowse
                CF09550WJ901.pdf.exeGet hashmaliciousBrowse
                  Order List PO# 081927.pdf.exeGet hashmaliciousBrowse
                    Doc#662020094753525765301499.pdf.exeGet hashmaliciousBrowse
                      Doc#6620200947535257653014.pdf.exeGet hashmaliciousBrowse
                        Doc#66202009475352576530141.pdf.exeGet hashmaliciousBrowse
                          Doc#66202009475352576503588.pdf.exeGet hashmaliciousBrowse

                            Domains

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            nanopc.linkpc.netDHL_10177_R293_DOCUMENT.exeGet hashmaliciousBrowse
                            • 105.112.101.201

                            ASN

                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                            OBE-EUROPEObenetworkEuropeSEUbnccbruoun7.exeGet hashmaliciousBrowse
                            • 185.157.160.228
                            DHL_10177_R293_DOCUMENT.exeGet hashmaliciousBrowse
                            • 185.157.162.81
                            INQUIRY ORDER.docGet hashmaliciousBrowse
                            • 194.32.146.99
                            INQUIRY ORDER.docGet hashmaliciousBrowse
                            • 194.32.146.99
                            INQUIRY ORDER.docGet hashmaliciousBrowse
                            • 194.32.146.99
                            https://cdn-34.anonfiles.com/J57b98L9o5/7860f6e3-1602497583/%D8%AA%D8%B7%D8%A8%D9%8A%D9%82%20%D8%A7%D9%84%D9%87%D8%AC%D8%A7%D8%A1%20%D9%84%D9%87%D8%A7%D8%AA%D9%81%20%D8%A7%D9%84%D8%A7%D9%94%D9%86%D8%AF%D8%B1%D9%88%D9%8A%D8%AF.apkGet hashmaliciousBrowse
                            • 45.148.16.57
                            Estado_de_Cargamentos_811012912_Impo_2020-10-05_28.exeGet hashmaliciousBrowse
                            • 45.148.16.42
                            Order_List_PO# 081928.pdf.exeGet hashmaliciousBrowse
                            • 185.157.162.81
                            SecuriteInfo.com.Variant.Bulz.82555.20565.exeGet hashmaliciousBrowse
                            • 45.148.16.42
                            StormKitty-1.exeGet hashmaliciousBrowse
                            • 45.148.16.42
                            CF09550WJ901.pdf.exeGet hashmaliciousBrowse
                            • 185.157.162.81
                            Order List PO# 081927.pdf.exeGet hashmaliciousBrowse
                            • 185.157.162.81
                            SJNRsFNyLl.exeGet hashmaliciousBrowse
                            • 185.86.106.226
                            5MkE8H6Sj3.exeGet hashmaliciousBrowse
                            • 185.86.106.226
                            Doc#662020094753525765301499.pdf.exeGet hashmaliciousBrowse
                            • 185.157.162.81
                            Doc#6620200947535257653014.pdf.exeGet hashmaliciousBrowse
                            • 185.157.162.81
                            Doc#66202009475352576530141.pdf.exeGet hashmaliciousBrowse
                            • 185.157.162.81
                            Doc#66202009475352576503588.pdf.exeGet hashmaliciousBrowse
                            • 185.157.162.81

                            JA3 Fingerprints

                            No context

                            Dropped Files

                            No context

                            Created / dropped Files

                            C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\ORDER PMX-PT-2001 STOCK+NOVO.exe.log
                            Process:C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:modified
                            Size (bytes):664
                            Entropy (8bit):5.288448637977022
                            Encrypted:false
                            SSDEEP:12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk70U2xANlW3ANv:MLF20NaL3z2p29hJ5g522rW2xAi3A9
                            MD5:B1DB55991C3DA14E35249AEA1BC357CA
                            SHA1:0DD2D91198FDEF296441B12F1A906669B279700C
                            SHA-256:34D3E48321D5010AD2BD1F3F0B728077E4F5A7F70D66FA36B57E5209580B6BDC
                            SHA-512:BE38A31888C9C2F8047FA9C99672CB985179D325107514B7500DDA9523AE3E1D20B45EACC4E6C8A5D096360D0FBB98A120E63F38FFE324DF8A0559F6890CC801
                            Malicious:true
                            Reputation:moderate, very likely benign file
                            Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\35774dc3cd31b4550ab06c3354cf4ba5\System.Runtime.Remoting.ni.dll",0..
                            C:\Users\user\AppData\Local\Temp\tmp1BEF.tmp
                            Process:C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1657
                            Entropy (8bit):5.157751041368054
                            Encrypted:false
                            SSDEEP:24:2dH4+SEqC/S7h2ulNMFp2O/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB3bNtn:cbha7JlNQV/rydbz9I3YODOLNdq3Nn
                            MD5:74821BCF48A29DFDAC349F3B5F24FBA6
                            SHA1:3F53F7A7216A6F7A19925A1E32ACFF93524BB193
                            SHA-256:AB72A4ACD0BE4653293D77A1614FBC63109353265FB80C5B10A44CE869BFFBCD
                            SHA-512:77E5A7B48AD83C4211E99D5F5C728FF5342A28433C3D95E3FF93E1B0678D4DDF089B69EAE3D2C54E9F4E35479FA4513080F2760B342417F41A275FE293D0049C
                            Malicious:true
                            Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvail
                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                            Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):8
                            Entropy (8bit):3.0
                            Encrypted:false
                            SSDEEP:3:RJ:RJ
                            MD5:C20A2B30ACBEAD57F5255DC21D03E9C0
                            SHA1:2988004D70BE62B288FAB10D0432A32A0CF68DB9
                            SHA-256:EF193A49FF3C77515747A1701E68137B4DBE6DD696842DC5FD9B646EF6C221B5
                            SHA-512:FF39C1A1BBE1C1495D1AC247F50597DD337882F143709700D07F656B4D0BF4816C7E5BF7BDD61E405CBBD449C1A7D1354AD9EB7C618CF5594038CEA0FA3D5D1E
                            Malicious:true
                            Preview: ...S4..H
                            C:\Users\user\AppData\Roaming\OBtaLehuZHtd.exe
                            Process:C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):927232
                            Entropy (8bit):7.256115423544032
                            Encrypted:false
                            SSDEEP:12288:dksfO0jHdT5zPvEfeVJQ34PjKYrFTm+UVYFXXrFX9rhhq3UwZtMsf05VMrWbugS8:ioZHR5LvE2VJQUj7ElUFXa
                            MD5:CE724D85D4615439FF27F5573C9AAA8F
                            SHA1:5DE819C63B446CF675C69376C9D7EC478DEA9060
                            SHA-256:7534A4FFB8EF83103485BCCE9D51B2AF93730A9D578E2B8B5F7FF473C0F8092D
                            SHA-512:A1E21BF82145E1B7FE8B50FF63A281D571ED745035BF1CA045F9540A60A69D6638E3CC65553A33828261F0877A85CDFEFA9BFD9A9880A63EFAA2684FAC5AA95D
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: Virustotal, Detection: 30%, Browse
                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...7.._..............P..............8... ...@....@.. ....................................@..................................8..S....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`.......$..............@..B.................8......H..................1....d...R...........................................0..........(....*...0..3.......r...p. ..& ...+a%..^E........c...5.......................8.....(....(....r...p(....-. .v4?%+. .m..%&. ...Za+..r...p(....(....,. Bv.m%+. -.]R%&. }.J.Za8n...(......-. sQ4"%+. .=.$%&8Q....r9..p(....(....-. \.}.%+. 0F..%&. .)..Za8#....(.... .#.E8....rM..p(..... a;.rZ ...a8...........s....(....%.(.....(....*..0...............('...*..0..2........u..... ..-. ....a%...^E....!...
                            C:\Users\user\AppData\Roaming\OBtaLehuZHtd.exe:Zone.Identifier
                            Process:C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):26
                            Entropy (8bit):3.95006375643621
                            Encrypted:false
                            SSDEEP:3:ggPYV:rPYV
                            MD5:187F488E27DB4AF347237FE461A079AD
                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                            Malicious:true
                            Preview: [ZoneTransfer]....ZoneId=0

                            Static File Info

                            General

                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):7.256115423544032
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                            • Win32 Executable (generic) a (10002005/4) 49.75%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Windows Screen Saver (13104/52) 0.07%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            File name:ORDER PMX-PT-2001 STOCK+NOVO.exe
                            File size:927232
                            MD5:ce724d85d4615439ff27f5573c9aaa8f
                            SHA1:5de819c63b446cf675c69376c9d7ec478dea9060
                            SHA256:7534a4ffb8ef83103485bcce9d51b2af93730a9d578e2b8b5f7ff473c0f8092d
                            SHA512:a1e21bf82145e1b7fe8b50ff63a281d571ed745035bf1ca045f9540a60a69d6638e3cc65553a33828261f0877a85cdfefa9bfd9a9880a63efaa2684fac5aa95d
                            SSDEEP:12288:dksfO0jHdT5zPvEfeVJQ34PjKYrFTm+UVYFXXrFX9rhhq3UwZtMsf05VMrWbugS8:ioZHR5LvE2VJQUj7ElUFXa
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...7.._..............P..............8... ...@....@.. ....................................@................................

                            File Icon

                            Icon Hash:00828e8e8686b000

                            Static PE Info

                            General

                            Entrypoint:0x4e38fe
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                            Time Stamp:0x5FBF0837 [Thu Nov 26 01:43:19 2020 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:v2.0.50727
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                            Entrypoint Preview

                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al

                            Data Directories

                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xe38a80x53.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xe40000x610.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xe60000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                            Sections

                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000xe19040xe1a00False0.676799471953data7.26187672346IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                            .rsrc0xe40000x6100x800False0.33154296875data3.44562136373IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0xe60000xc0x200False0.041015625data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                            Resources

                            NameRVASizeTypeLanguageCountry
                            RT_VERSION0xe40a00x380data
                            RT_MANIFEST0xe44200x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                            Imports

                            DLLImport
                            mscoree.dll_CorExeMain

                            Version Infos

                            DescriptionData
                            Translation0x0000 0x04b0
                            LegalCopyrightCopyright Hewlett-Packard 2017
                            Assembly Version1.0.0.0
                            InternalName2e6s.exe
                            FileVersion1.0.0.0
                            CompanyNameHewlett-Packard
                            LegalTrademarks
                            Comments
                            ProductNameArizona Lottery Numbers
                            ProductVersion1.0.0.0
                            FileDescriptionArizona Lottery Numbers
                            OriginalFilename2e6s.exe

                            Network Behavior

                            Network Port Distribution

                            TCP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            Nov 26, 2020 09:54:33.876842022 CET4971440700192.168.2.6185.157.162.81
                            Nov 26, 2020 09:54:36.877525091 CET4971440700192.168.2.6185.157.162.81
                            Nov 26, 2020 09:54:42.416287899 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:54:42.416327000 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:54:42.416387081 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:54:42.416420937 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:54:42.586405039 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.586430073 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.586441040 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.586456060 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.586472034 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.586487055 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.586503983 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.586524010 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.586540937 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.586555958 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:54:42.586587906 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:54:42.586608887 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.586667061 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:54:42.598721027 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.598757029 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.598786116 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.598810911 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:54:42.598826885 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.598855019 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.598875046 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:54:42.598884106 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.598921061 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.598936081 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:54:42.598953962 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.599004984 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.599005938 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:54:42.599044085 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.599104881 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:54:42.612081051 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.612124920 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.612160921 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.612184048 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:54:42.612198114 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.612236977 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.612262011 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:54:42.612273932 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.612313032 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.612333059 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:54:42.612353086 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.612402916 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.612410069 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:54:42.612441063 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:54:42.612504005 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:54:42.877913952 CET4971440700192.168.2.6185.157.162.81
                            Nov 26, 2020 09:54:52.692703009 CET4972040700192.168.2.6185.157.162.81
                            Nov 26, 2020 09:54:55.740345955 CET4972040700192.168.2.6185.157.162.81
                            Nov 26, 2020 09:55:01.739180088 CET4972040700192.168.2.6185.157.162.81
                            Nov 26, 2020 09:55:03.849091053 CET4968280192.168.2.62.20.142.210
                            Nov 26, 2020 09:55:03.849329948 CET4968480192.168.2.693.184.220.29
                            Nov 26, 2020 09:55:03.865498066 CET80496822.20.142.210192.168.2.6
                            Nov 26, 2020 09:55:03.865514994 CET804968493.184.220.29192.168.2.6
                            Nov 26, 2020 09:55:03.865608931 CET4968280192.168.2.62.20.142.210
                            Nov 26, 2020 09:55:03.865685940 CET4968480192.168.2.693.184.220.29
                            Nov 26, 2020 09:55:04.052180052 CET804968193.184.220.29192.168.2.6
                            Nov 26, 2020 09:55:04.052809000 CET4968180192.168.2.693.184.220.29
                            Nov 26, 2020 09:55:04.489773035 CET49686443192.168.2.6104.108.60.202
                            Nov 26, 2020 09:55:04.506099939 CET44349686104.108.60.202192.168.2.6
                            Nov 26, 2020 09:55:04.506124973 CET44349686104.108.60.202192.168.2.6
                            Nov 26, 2020 09:55:04.506222010 CET49686443192.168.2.6104.108.60.202
                            Nov 26, 2020 09:55:04.506242037 CET49686443192.168.2.6104.108.60.202
                            Nov 26, 2020 09:55:04.627742052 CET804968593.184.220.29192.168.2.6
                            Nov 26, 2020 09:55:04.627842903 CET4968580192.168.2.693.184.220.29
                            Nov 26, 2020 09:55:05.065186977 CET804968093.184.220.29192.168.2.6
                            Nov 26, 2020 09:55:05.065326929 CET4968080192.168.2.693.184.220.29
                            Nov 26, 2020 09:55:05.962677002 CET49699443192.168.2.6204.79.197.200
                            Nov 26, 2020 09:55:07.156651020 CET804970293.184.220.29192.168.2.6
                            Nov 26, 2020 09:55:07.156977892 CET4970280192.168.2.693.184.220.29
                            Nov 26, 2020 09:55:08.013235092 CET49701443192.168.2.623.210.249.50
                            Nov 26, 2020 09:55:08.013411999 CET4970280192.168.2.693.184.220.29
                            Nov 26, 2020 09:55:11.772195101 CET4974140700192.168.2.6185.157.162.81
                            Nov 26, 2020 09:55:14.771539927 CET4974140700192.168.2.6185.157.162.81
                            Nov 26, 2020 09:55:20.787298918 CET4974140700192.168.2.6185.157.162.81
                            Nov 26, 2020 09:55:29.516587973 CET4974440700192.168.2.6185.157.162.81
                            Nov 26, 2020 09:55:32.522639990 CET4974440700192.168.2.6185.157.162.81
                            Nov 26, 2020 09:55:38.523539066 CET4974440700192.168.2.6185.157.162.81
                            Nov 26, 2020 09:55:46.481851101 CET4974740700192.168.2.6185.157.162.81
                            Nov 26, 2020 09:55:49.492790937 CET4974740700192.168.2.6185.157.162.81
                            Nov 26, 2020 09:55:52.978184938 CET4968080192.168.2.693.184.220.29
                            Nov 26, 2020 09:55:52.978399038 CET4968180192.168.2.693.184.220.29
                            Nov 26, 2020 09:55:52.978409052 CET49677443192.168.2.640.90.22.191
                            Nov 26, 2020 09:55:52.994458914 CET804968093.184.220.29192.168.2.6
                            Nov 26, 2020 09:55:52.994496107 CET804968193.184.220.29192.168.2.6
                            Nov 26, 2020 09:55:52.995488882 CET4968080192.168.2.693.184.220.29
                            Nov 26, 2020 09:55:52.995496988 CET4968180192.168.2.693.184.220.29
                            Nov 26, 2020 09:55:53.148066044 CET4434967740.90.22.191192.168.2.6
                            Nov 26, 2020 09:55:53.148196936 CET49677443192.168.2.640.90.22.191
                            Nov 26, 2020 09:55:53.212937117 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:55:53.382978916 CET4434967840.90.22.191192.168.2.6
                            Nov 26, 2020 09:55:53.383265972 CET49678443192.168.2.640.90.22.191
                            Nov 26, 2020 09:55:55.493424892 CET4974740700192.168.2.6185.157.162.81
                            Nov 26, 2020 09:56:05.356472015 CET4975140700192.168.2.6185.157.162.81
                            Nov 26, 2020 09:56:06.067751884 CET804968593.184.220.29192.168.2.6
                            Nov 26, 2020 09:56:06.068116903 CET4968580192.168.2.693.184.220.29
                            Nov 26, 2020 09:56:08.348980904 CET4975140700192.168.2.6185.157.162.81

                            UDP Packets

                            TimestampSource PortDest PortSource IPDest IP
                            Nov 26, 2020 09:54:24.288594961 CET5602353192.168.2.68.8.8.8
                            Nov 26, 2020 09:54:24.315777063 CET53560238.8.8.8192.168.2.6
                            Nov 26, 2020 09:54:27.965220928 CET5838453192.168.2.68.8.8.8
                            Nov 26, 2020 09:54:27.992178917 CET53583848.8.8.8192.168.2.6
                            Nov 26, 2020 09:54:42.825367928 CET6026153192.168.2.68.8.8.8
                            Nov 26, 2020 09:54:42.852485895 CET53602618.8.8.8192.168.2.6
                            Nov 26, 2020 09:54:45.245971918 CET5606153192.168.2.68.8.8.8
                            Nov 26, 2020 09:54:45.273152113 CET53560618.8.8.8192.168.2.6
                            Nov 26, 2020 09:54:46.775904894 CET5833653192.168.2.68.8.8.8
                            Nov 26, 2020 09:54:46.802928925 CET53583368.8.8.8192.168.2.6
                            Nov 26, 2020 09:54:47.892515898 CET5378153192.168.2.68.8.8.8
                            Nov 26, 2020 09:54:47.919559002 CET53537818.8.8.8192.168.2.6
                            Nov 26, 2020 09:54:58.179836988 CET5406453192.168.2.68.8.8.8
                            Nov 26, 2020 09:54:58.207010031 CET53540648.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:00.410944939 CET5281153192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:00.446618080 CET53528118.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:01.018721104 CET5529953192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:01.054347992 CET53552998.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:01.467667103 CET6374553192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:01.505188942 CET53637458.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:01.791971922 CET5005553192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:01.827680111 CET53500558.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:02.158008099 CET6137453192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:02.176760912 CET5033953192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:02.193687916 CET53613748.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:02.203960896 CET53503398.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:03.128297091 CET6330753192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:03.163994074 CET53633078.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:03.682431936 CET4969453192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:03.718391895 CET53496948.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:03.918296099 CET5498253192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:03.945344925 CET53549828.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:04.000586987 CET5001053192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:04.027589083 CET53500108.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:04.279766083 CET6371853192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:04.306961060 CET53637188.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:05.008614063 CET6211653192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:05.044142008 CET53621168.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:05.400423050 CET6381653192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:05.427606106 CET53638168.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:05.814524889 CET5501453192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:05.850156069 CET53550148.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:11.313044071 CET6220853192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:11.352133036 CET53622088.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:14.762459993 CET5757453192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:14.805686951 CET53575748.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:28.665090084 CET5181853192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:28.692254066 CET53518188.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:29.373004913 CET5662853192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:29.514488935 CET53566288.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:29.837275028 CET6077853192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:29.864356995 CET53607788.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:39.535485029 CET5379953192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:39.562618017 CET53537998.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:46.442470074 CET5468353192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:46.480175018 CET53546838.8.8.8192.168.2.6
                            Nov 26, 2020 09:55:49.509167910 CET5932953192.168.2.68.8.8.8
                            Nov 26, 2020 09:55:49.548579931 CET53593298.8.8.8192.168.2.6
                            Nov 26, 2020 09:56:05.202418089 CET6402153192.168.2.68.8.8.8
                            Nov 26, 2020 09:56:05.355149031 CET53640218.8.8.8192.168.2.6
                            Nov 26, 2020 09:56:06.826370001 CET5612953192.168.2.68.8.8.8
                            Nov 26, 2020 09:56:06.853466988 CET53561298.8.8.8192.168.2.6
                            Nov 26, 2020 09:56:12.634813070 CET5817753192.168.2.68.8.8.8
                            Nov 26, 2020 09:56:12.661889076 CET53581778.8.8.8192.168.2.6

                            DNS Queries

                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                            Nov 26, 2020 09:55:14.762459993 CET192.168.2.68.8.8.80x4d36Standard query (0)g.msn.comA (IP address)IN (0x0001)
                            Nov 26, 2020 09:55:29.373004913 CET192.168.2.68.8.8.80x827eStandard query (0)nanopc.linkpc.netA (IP address)IN (0x0001)
                            Nov 26, 2020 09:55:46.442470074 CET192.168.2.68.8.8.80x313aStandard query (0)nanopc.linkpc.netA (IP address)IN (0x0001)
                            Nov 26, 2020 09:56:05.202418089 CET192.168.2.68.8.8.80xc233Standard query (0)nanopc.linkpc.netA (IP address)IN (0x0001)

                            DNS Answers

                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                            Nov 26, 2020 09:55:14.805686951 CET8.8.8.8192.168.2.60x4d36No error (0)g.msn.comg-msn-com-nsatc.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                            Nov 26, 2020 09:55:29.514488935 CET8.8.8.8192.168.2.60x827eNo error (0)nanopc.linkpc.net185.157.162.81A (IP address)IN (0x0001)
                            Nov 26, 2020 09:55:46.480175018 CET8.8.8.8192.168.2.60x313aNo error (0)nanopc.linkpc.net185.157.162.81A (IP address)IN (0x0001)
                            Nov 26, 2020 09:56:05.355149031 CET8.8.8.8192.168.2.60xc233No error (0)nanopc.linkpc.net185.157.162.81A (IP address)IN (0x0001)

                            Code Manipulations

                            Statistics

                            Behavior

                            Click to jump to process

                            System Behavior

                            General

                            Start time:09:54:18
                            Start date:26/11/2020
                            Path:C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Users\user\Desktop\ORDER PMX-PT-2001 STOCK+NOVO.exe'
                            Imagebase:0x690000
                            File size:927232 bytes
                            MD5 hash:CE724D85D4615439FF27F5573C9AAA8F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.360073804.0000000003FDD000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.360073804.0000000003FDD000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.360073804.0000000003FDD000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.357258593.0000000002F01000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.357341507.0000000002F8C000.00000004.00000001.sdmp, Author: Joe Security
                            Reputation:low

                            General

                            Start time:09:54:29
                            Start date:26/11/2020
                            Path:C:\Windows\SysWOW64\schtasks.exe
                            Wow64 process (32bit):true
                            Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\OBtaLehuZHtd' /XML 'C:\Users\user\AppData\Local\Temp\tmp1BEF.tmp'
                            Imagebase:0xaf0000
                            File size:185856 bytes
                            MD5 hash:15FF7D8324231381BAD48A052F85DF04
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:09:54:30
                            Start date:26/11/2020
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff61de10000
                            File size:625664 bytes
                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high

                            General

                            Start time:09:54:30
                            Start date:26/11/2020
                            Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                            Imagebase:0xba0000
                            File size:69632 bytes
                            MD5 hash:88BBB7610152B48C2B3879473B17857E
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:.Net C# or VB.NET
                            Yara matches:
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.592799411.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.592799411.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.592799411.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.599041317.0000000005960000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.599041317.0000000005960000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.599041317.0000000005960000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.598672636.00000000054F0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.598672636.00000000054F0000.00000004.00000001.sdmp, Author: Florian Roth
                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.597422084.00000000041A7000.00000004.00000001.sdmp, Author: Joe Security
                            • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.597422084.00000000041A7000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                            Reputation:moderate

                            Disassembly

                            Code Analysis

                            Reset < >