Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.Trojan.DownLoader36.7233.23906.21829

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.DownLoader36.7233.23906.21829 (renamed file extension from 21829 to exe)
Analysis ID:324206
MD5:ee4555ac614048e36aae067b6a032951
SHA1:c7559fe7c094d4643ea3ab09c071fa0ac8ec18a4
SHA256:3a2278374596d368ec773c10d54ec91f69445144248769abb155de58215d8c2c

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Nanocore Rat
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Nanocore RAT
Connects to many ports of the same IP (likely port scanning)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe (PID: 2440 cmdline: 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe' MD5: EE4555AC614048E36AAE067B6A032951)
    • conhost.exe (PID: 5092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • cmd.exe (PID: 5316 cmdline: cmd /c schtasks /Create /TN images /XML 'C:\Users\user\AppData\Local\Temp\27c398b5630447af830b2dd2bc343446.xml' MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • schtasks.exe (PID: 4928 cmdline: schtasks /Create /TN images /XML 'C:\Users\user\AppData\Local\Temp\27c398b5630447af830b2dd2bc343446.xml' MD5: 15FF7D8324231381BAD48A052F85DF04)
    • MSBuild.exe (PID: 2152 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe MD5: 88BBB7610152B48C2B3879473B17857E)
      • schtasks.exe (PID: 5920 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp182E.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 5948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 2168 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp1B1D.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 4120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • MSBuild.exe (PID: 5292 cmdline: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0 MD5: 88BBB7610152B48C2B3879473B17857E)
    • conhost.exe (PID: 1968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 5972 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 88BBB7610152B48C2B3879473B17857E)
    • conhost.exe (PID: 2792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 5588 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 88BBB7610152B48C2B3879473B17857E)
    • conhost.exe (PID: 5860 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.220940423.000000000032A000.00000004.00020000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x15bdd:$x1: NanoCore.ClientPluginHost
  • 0x15c1a:$x2: IClientNetworkHost
  • 0x1974d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000000.00000002.220940423.000000000032A000.00000004.00020000.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000000.00000002.220940423.000000000032A000.00000004.00020000.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x15945:$a: NanoCore
    • 0x15955:$a: NanoCore
    • 0x15b89:$a: NanoCore
    • 0x15b9d:$a: NanoCore
    • 0x15bdd:$a: NanoCore
    • 0x159a4:$b: ClientPlugin
    • 0x15ba6:$b: ClientPlugin
    • 0x15be6:$b: ClientPlugin
    • 0x15acb:$c: ProjectData
    • 0x164d2:$d: DESCrypto
    • 0x1de9e:$e: KeepAlive
    • 0x1be8c:$g: LogClientMessage
    • 0x18087:$i: get_Connected
    • 0x16808:$j: #=q
    • 0x16838:$j: #=q
    • 0x16854:$j: #=q
    • 0x16884:$j: #=q
    • 0x168a0:$j: #=q
    • 0x168bc:$j: #=q
    • 0x168ec:$j: #=q
    • 0x16908:$j: #=q
    00000003.00000003.228783921.0000000004481000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x1312:$a: NanoCore
    • 0x1337:$a: NanoCore
    • 0x1390:$a: NanoCore
    • 0x1152d:$a: NanoCore
    • 0x11553:$a: NanoCore
    • 0x115af:$a: NanoCore
    • 0x1e404:$a: NanoCore
    • 0x1e45d:$a: NanoCore
    • 0x1e490:$a: NanoCore
    • 0x1e6bc:$a: NanoCore
    • 0x1e738:$a: NanoCore
    • 0x1ed51:$a: NanoCore
    • 0x1ee9a:$a: NanoCore
    • 0x1f36e:$a: NanoCore
    • 0x1f655:$a: NanoCore
    • 0x1f66c:$a: NanoCore
    • 0x229f5:$a: NanoCore
    • 0x23daf:$a: NanoCore
    • 0x23df9:$a: NanoCore
    • 0x24a53:$a: NanoCore
    • 0x2a038:$a: NanoCore
    Process Memory Space: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe PID: 2440Nanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x10df52:$x1: NanoCore.ClientPluginHost
    • 0x10dfb3:$x2: IClientNetworkHost
    • 0x1133b8:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x12132a:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    Click to see the 3 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    0.2.SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe.320000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1e5dd:$x1: NanoCore.ClientPluginHost
    • 0x1e61a:$x2: IClientNetworkHost
    • 0x2214d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0.2.SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe.320000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0x1e355:$x1: NanoCore Client.exe
    • 0x1e5dd:$x2: NanoCore.ClientPluginHost
    • 0x1fc16:$s1: PluginCommand
    • 0x1fc0a:$s2: FileCommand
    • 0x20abb:$s3: PipeExists
    • 0x26872:$s4: PipeCreated
    • 0x1e607:$s5: IClientLoggingHost
    0.2.SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe.320000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0.2.SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe.320000.0.unpackNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x1e345:$a: NanoCore
      • 0x1e355:$a: NanoCore
      • 0x1e589:$a: NanoCore
      • 0x1e59d:$a: NanoCore
      • 0x1e5dd:$a: NanoCore
      • 0x1e3a4:$b: ClientPlugin
      • 0x1e5a6:$b: ClientPlugin
      • 0x1e5e6:$b: ClientPlugin
      • 0x1e4cb:$c: ProjectData
      • 0x1eed2:$d: DESCrypto
      • 0x2689e:$e: KeepAlive
      • 0x2488c:$g: LogClientMessage
      • 0x20a87:$i: get_Connected
      • 0x1f208:$j: #=q
      • 0x1f238:$j: #=q
      • 0x1f254:$j: #=q
      • 0x1f284:$j: #=q
      • 0x1f2a0:$j: #=q
      • 0x1f2bc:$j: #=q
      • 0x1f2ec:$j: #=q
      • 0x1f308:$j: #=q

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ProcessId: 2152, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Sigma detected: Scheduled temp file as task from temp locationShow sources
      Source: Process startedAuthor: Joe Security: Data: Command: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp182E.tmp', CommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp182E.tmp', CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ParentImage: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe, ParentProcessId: 2152, ProcessCommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp182E.tmp', ProcessId: 5920

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Antivirus / Scanner detection for submitted sampleShow sources
      Source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeAvira: detected
      Antivirus detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Local\Temp\Temp\images.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Local\Temp\Temp\images.exeReversingLabs: Detection: 79%
      Multi AV Scanner detection for submitted fileShow sources
      Source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeMetadefender: Detection: 21%Perma Link
      Source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeReversingLabs: Detection: 75%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.220940423.000000000032A000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe PID: 2440, type: MEMORY
      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe.320000.0.unpack, type: UNPACKEDPE
      Machine Learning detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Local\Temp\Temp\images.exeJoe Sandbox ML: detected
      Machine Learning detection for sampleShow sources
      Source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeJoe Sandbox ML: detected
      Source: 0.2.SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe.320000.0.unpackAvira: Label: TR/ATRAPS.Gen
      Source: 0.0.SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe.320000.0.unpackAvira: Label: TR/ATRAPS.Gen

      Networking:

      barindex
      Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
      Source: TrafficSnort IDS: 2025019 ET TROJAN Possible NanoCore C2 60B 192.168.2.3:49723 -> 209.159.151.5:24980
      Connects to many ports of the same IP (likely port scanning)Show sources
      Source: global trafficTCP traffic: 209.159.151.5 ports 0,2,4,24980,8,9
      Source: global trafficTCP traffic: 192.168.2.3:49723 -> 209.159.151.5:24980
      Source: Joe Sandbox ViewASN Name: IS-AS-1US IS-AS-1US
      Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.200
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: unknownTCP traffic detected without corresponding DNS query: 209.159.151.5
      Source: MSBuild.exe, 00000003.00000003.228783921.0000000004481000.00000004.00000001.sdmpString found in binary or memory: http://google.com
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49687
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49685
      Source: unknownNetwork traffic detected: HTTP traffic on port 49694 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49694
      Source: unknownNetwork traffic detected: HTTP traffic on port 49679 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49692 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49690
      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49685 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49690 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49687 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49679

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.220940423.000000000032A000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe PID: 2440, type: MEMORY
      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe.320000.0.unpack, type: UNPACKEDPE

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000000.00000002.220940423.000000000032A000.00000004.00020000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.220940423.000000000032A000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000003.00000003.228783921.0000000004481000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe PID: 2440, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe PID: 2440, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: MSBuild.exe PID: 2152, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 0.2.SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe.320000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 0.2.SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe.320000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeCode function: 0_2_00321090 LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetConsoleWindow,ShowWindow,LoadLibraryA,RpcMgmtEpEltInqBegin,NtCreateSection,NtMapViewOfSection,CloseHandle,CallWindowProcW,
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeCode function: 0_2_00324D98
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeCode function: 9_2_05190708
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_00F20708
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_00896D08
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_00896950
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_0089692F
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 14_2_05050708
      Source: dhcpmon.exe.3.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: dhcpmon.exe.3.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: dhcpmon.exe.3.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe, 00000000.00000003.217098916.0000000002ABF000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe
      Source: 00000000.00000002.220940423.000000000032A000.00000004.00020000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.220940423.000000000032A000.00000004.00020000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000003.00000003.228783921.0000000004481000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe PID: 2440, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe PID: 2440, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: MSBuild.exe PID: 2152, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 0.2.SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe.320000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 0.2.SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe.320000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 0.2.SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe.320000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: dhcpmon.exe, 0000000E.00000002.250115588.0000000002E41000.00000004.00000001.sdmpBinary or memory string: kr*)C:\Program Files (x86)\DHCP Monitor\*.sln
      Source: dhcpmon.exe, 0000000B.00000000.225859011.00000000004C2000.00000002.00020000.sdmp, dhcpmon.exe, 0000000E.00000002.249042696.0000000000892000.00000002.00020000.sdmp, dhcpmon.exe.3.drBinary or memory string: MSBuild MyApp.sln /t:Rebuild /p:Configuration=Release
      Source: dhcpmon.exe, 0000000B.00000000.225859011.00000000004C2000.00000002.00020000.sdmp, dhcpmon.exe, 0000000E.00000002.249042696.0000000000892000.00000002.00020000.sdmp, dhcpmon.exe.3.drBinary or memory string: MSBuild MyApp.csproj /t:Clean /p:Configuration=Debug
      Source: dhcpmon.exe, 0000000B.00000000.225859011.00000000004C2000.00000002.00020000.sdmp, dhcpmon.exe, 0000000E.00000002.249042696.0000000000892000.00000002.00020000.sdmp, dhcpmon.exe.3.drBinary or memory string: *.sln+AmbiguousProjectError'MissingProjectError)ProjectNotFoundError)InvalidPropertyError
      Source: dhcpmon.exeBinary or memory string: *.sln
      Source: classification engineClassification label: mal100.troj.evad.winEXE@20/15@0/1
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9AJump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5948:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2792:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1968:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5092:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{8127ccf6-0246-44cc-81bf-cfc57c0704b0}
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5860:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4120:120:WilError_01
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeFile created: C:\Users\user\AppData\Local\Temp\TempJump to behavior
      Source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeMetadefender: Detection: 21%
      Source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeReversingLabs: Detection: 75%
      Source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeString found in binary or memory: </UserId><LogonType>InteractiveToken</LogonType><RunLevel>LeastPrivilege</RunLevel></Principal></Principals><Settings><MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy><AllowHardTerminate>false</AllowHardTerminate><StartWhenAvailable>true</StartWhenAvailable><RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable><IdleSettings><StopOnIdleEnd>true</StopOnIdleEnd><RestartOnIdle>false</RestartOnIdle></IdleSettings><AllowStartOnDemand>true</AllowStartOnDemand><Enabled>true</Enabled><Hidden>false</Hidden><RunOnlyIfIdle>false</RunOnlyIfIdle><WakeToRun>false</WakeToRun><ExecutionTimeLimit>PT0S</ExecutionTimeLimit><Priority>7</Priority></Settings><Actions Context="Author"><Exec><Command>
      Source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeString found in binary or memory: </UserId><LogonType>InteractiveToken</LogonType><RunLevel>LeastPrivilege</RunLevel></Principal></Principals><Settings><MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy><AllowHardTerminate>false</AllowHardTerminate><StartWhenAvailable>true</StartWhenAvailable><RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable><IdleSettings><StopOnIdleEnd>true</StopOnIdleEnd><RestartOnIdle>false</RestartOnIdle></IdleSettings><AllowStartOnDemand>true</AllowStartOnDemand><Enabled>true</Enabled><Hidden>false</Hidden><RunOnlyIfIdle>false</RunOnlyIfIdle><WakeToRun>false</WakeToRun><ExecutionTimeLimit>PT0S</ExecutionTimeLimit><Priority>7</Priority></Settings><Actions Context="Author"><Exec><Command>
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /Create /TN images /XML 'C:\Users\user\AppData\Local\Temp\27c398b5630447af830b2dd2bc343446.xml'
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Create /TN images /XML 'C:\Users\user\AppData\Local\Temp\27c398b5630447af830b2dd2bc343446.xml'
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp182E.tmp'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp1B1D.tmp'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks /Create /TN images /XML 'C:\Users\user\AppData\Local\Temp\27c398b5630447af830b2dd2bc343446.xml'
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Create /TN images /XML 'C:\Users\user\AppData\Local\Temp\27c398b5630447af830b2dd2bc343446.xml'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp182E.tmp'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp1B1D.tmp'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll
      Source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: wntdll.pdbUGP source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe, 00000000.00000003.216864769.0000000002810000.00000004.00000001.sdmp
      Source: Binary string: wntdll.pdb source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe, 00000000.00000003.216864769.0000000002810000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: MSBuild.exe, 00000003.00000003.228783921.0000000004481000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: MSBuild.exe, 00000003.00000003.228783921.0000000004481000.00000004.00000001.sdmp
      Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: MSBuild.exe, 00000003.00000003.228783921.0000000004481000.00000004.00000001.sdmp
      Source: Binary string: f:\dd\vsproject\xmake\XMakeCommandLine\objr\i386\MSBuild.pdb source: dhcpmon.exe, dhcpmon.exe.3.dr
      Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: MSBuild.exe, 00000003.00000003.228783921.0000000004481000.00000004.00000001.sdmp
      Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: MSBuild.exe, 00000003.00000003.228783921.0000000004481000.00000004.00000001.sdmp
      Source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
      Source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
      Source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
      Source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
      Source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeCode function: 0_2_00321090 LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetConsoleWindow,ShowWindow,LoadLibraryA,RpcMgmtEpEltInqBegin,NtCreateSection,NtMapViewOfSection,CloseHandle,CallWindowProcW,
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeCode function: 0_2_00322979 push ecx; ret
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeFile created: C:\Users\user\AppData\Local\Temp\Temp\images.exeJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Create /TN images /XML 'C:\Users\user\AppData\Local\Temp\27c398b5630447af830b2dd2bc343446.xml'

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe:Zone.Identifier read attributes | delete
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: threadDelayed 661
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: foregroundWindowGot 639
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWindow / User API: foregroundWindowGot 609
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\Temp\images.exeJump to dropped file
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 5912Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 5712Thread sleep time: -40000s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe TID: 6076Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6044Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5932Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: MSBuild.exe, 00000003.00000003.310491763.0000000000DBE000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeCode function: 0_2_003212F4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeCode function: 0_2_00321090 LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetConsoleWindow,ShowWindow,LoadLibraryA,RpcMgmtEpEltInqBegin,NtCreateSection,NtMapViewOfSection,CloseHandle,CallWindowProcW,
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeCode function: 0_2_00AB4C15 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeCode function: 0_2_00AB4C78 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeCode function: 0_2_00AB13B8 mov eax, dword ptr fs:[00000030h]
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeCode function: 0_2_00AB4BD8 mov eax, dword ptr fs:[00000030h]
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeCode function: 0_2_003254B3 __NMSG_WRITE,_raise,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeCode function: 0_2_003212F4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeCode function: 0_2_00322DC2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Maps a DLL or memory area into another processShow sources
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeSection loaded: unknown target: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe protection: execute and read and write
      Writes to foreign memory regionsShow sources
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeMemory written: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe base: AFE008
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeProcess created: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Create /TN images /XML 'C:\Users\user\AppData\Local\Temp\27c398b5630447af830b2dd2bc343446.xml'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp182E.tmp'
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp1B1D.tmp'
      Source: MSBuild.exe, 00000003.00000003.310491763.0000000000DBE000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: MSBuild.exe, 00000003.00000003.280492949.0000000000DB7000.00000004.00000001.sdmpBinary or memory string: Program Manager (x86)\DHCP Monitor\dhcpmon.exeBuild.exeentImporter, system.workflowservices, Version=3.5.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=MSIL"/>
      Source: MSBuild.exe, 00000003.00000003.310491763.0000000000DBE000.00000004.00000001.sdmpBinary or memory string: Program Manager (x86)\DHCP Monitor\dhcpmon.exe
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeCode function: GetLocaleInfoA,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Engine\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Engine.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Build.Framework\2.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Framework.dll VolumeInformation
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeCode function: 0_2_00322B1C GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exeCode function: 0_2_00AB24D4 GetUserNameA,CreateFileW,WriteFile,FindCloseChangeNotification,VirtualAlloc,CreateProcessW,
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.220940423.000000000032A000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe PID: 2440, type: MEMORY
      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe.320000.0.unpack, type: UNPACKEDPE

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe, 00000000.00000002.220940423.000000000032A000.00000004.00020000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: MSBuild.exe, 00000003.00000003.228783921.0000000004481000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: MSBuild.exe, 00000003.00000003.228783921.0000000004481000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
      Source: MSBuild.exe, 00000003.00000003.228783921.0000000004481000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
      Source: MSBuild.exe, 00000003.00000003.228783921.0000000004481000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
      Source: MSBuild.exe, 00000003.00000003.228783921.0000000004481000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.220940423.000000000032A000.00000004.00020000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe PID: 2440, type: MEMORY
      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe.320000.0.unpack, type: UNPACKEDPE

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Process Injection212Masquerading2OS Credential DumpingSystem Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsCommand and Scripting Interpreter2Boot or Logon Initialization ScriptsScheduled Task/Job1Virtualization/Sandbox Evasion2LSASS MemorySecurity Software Discovery121Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsScheduled Task/Job1Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsNative API1Logon Script (Mac)Logon Script (Mac)Process Injection212NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptHidden Files and Directories1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsAccount Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing1DCSyncSystem Owner/User Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery23Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 324206 Sample: SecuriteInfo.com.Trojan.Dow... Startdate: 28/11/2020 Architecture: WINDOWS Score: 100 55 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 Antivirus detection for dropped file 2->59 61 11 other signatures 2->61 8 SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe 4 2->8         started        12 dhcpmon.exe 5 2->12         started        14 dhcpmon.exe 6 2->14         started        16 MSBuild.exe 4 2->16         started        process3 file4 49 C:\Users\user\AppData\Local\...\images.exe, PE32 8->49 dropped 51 C:\...\27c398b5630447af830b2dd2bc343446.xml, XML 8->51 dropped 65 Writes to foreign memory regions 8->65 67 Maps a DLL or memory area into another process 8->67 18 MSBuild.exe 1 16 8->18         started        23 cmd.exe 1 8->23         started        25 conhost.exe 8->25         started        27 conhost.exe 12->27         started        29 conhost.exe 14->29         started        31 conhost.exe 16->31         started        signatures5 process6 dnsIp7 53 209.159.151.5, 24980, 49723 IS-AS-1US United States 18->53 43 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 18->43 dropped 45 C:\Users\user\AppData\Local\...\tmp182E.tmp, XML 18->45 dropped 47 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->47 dropped 63 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->63 33 schtasks.exe 1 18->33         started        35 schtasks.exe 1 18->35         started        37 schtasks.exe 1 23->37         started        file8 signatures9 process10 process11 39 conhost.exe 33->39         started        41 conhost.exe 35->41         started       

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe24%MetadefenderBrowse
      SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe75%ReversingLabsWin32.Exploit.CVE-2017-11882
      SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe100%AviraTR/ATRAPS.Gen
      SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\Temp\images.exe100%AviraTR/ATRAPS.Gen
      C:\Users\user\AppData\Local\Temp\Temp\images.exe100%Joe Sandbox ML
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\Temp\images.exe79%ReversingLabsWin32.Backdoor.NanoCore

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      0.2.SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe.320000.0.unpack100%AviraTR/ATRAPS.GenDownload File
      0.0.SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe.320000.0.unpack100%AviraTR/ATRAPS.GenDownload File

      Domains

      No Antivirus matches

      URLs

      No Antivirus matches

      Domains and IPs

      Contacted Domains

      No contacted domains info

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      209.159.151.5
      unknownUnited States
      19318IS-AS-1UStrue

      General Information

      Joe Sandbox Version:31.0.0 Red Diamond
      Analysis ID:324206
      Start date:28.11.2020
      Start time:17:48:18
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 7m 17s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:SecuriteInfo.com.Trojan.DownLoader36.7233.23906.21829 (renamed file extension from 21829 to exe)
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:36
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.troj.evad.winEXE@20/15@0/1
      EGA Information:Failed
      HDC Information:
      • Successful, ratio: 42.5% (good quality ratio 38.5%)
      • Quality average: 78.8%
      • Quality standard deviation: 31%
      HCA Information:
      • Successful, ratio: 88%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      Warnings:
      Show All
      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
      • TCP Packets have been reduced to 100
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
      • Excluded IPs from analysis (whitelisted): 104.43.139.144, 52.147.198.201, 104.43.193.48, 51.104.139.180, 92.122.144.200, 20.54.26.129, 93.184.221.240, 92.122.213.194, 92.122.213.247, 51.11.168.160
      • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, fs.microsoft.com, wu.ec.azureedge.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, wu.wpc.apr-52dd2.edgecastdns.net, au-bg-shim.trafficmanager.net
      • Report size exceeded maximum capacity and may have missing behavior information.
      • VT rate limit hit for: /opt/package/joesandbox/database/analysis/324206/sample/SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe

      Simulations

      Behavior and APIs

      TimeTypeDescription
      17:49:16Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe" s>$(Arg0)
      17:49:16API Interceptor956x Sleep call for process: MSBuild.exe modified
      17:49:17Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
      17:49:18AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe

      Joe Sandbox View / Context

      IPs

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      209.159.151.5Package_details.exeGet hashmaliciousBrowse

        Domains

        No context

        ASN

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        IS-AS-1USPackage_details.exeGet hashmaliciousBrowse
        • 209.159.151.5
        https://bakrisoil.com/wp-content/cd.php?e=gjeffries@hughesellard.comGet hashmaliciousBrowse
        • 104.218.51.229
        baf6b9fcec491619b45c1dd7db56ad3d.exeGet hashmaliciousBrowse
        • 66.45.248.130
        https://encrypt.poweradz.net/Get hashmaliciousBrowse
        • 209.159.158.130
        http://encrypt.poweradz.netGet hashmaliciousBrowse
        • 209.159.158.130
        eLaaw7SqMi.exeGet hashmaliciousBrowse
        • 104.37.188.231
        p8LV1eVFyO.exeGet hashmaliciousBrowse
        • 66.45.248.130
        Invoice_334654_168522_from_Inc.xlsmGet hashmaliciousBrowse
        • 216.219.81.3
        Invoice_403372_917428_from_Inc.xlsmGet hashmaliciousBrowse
        • 216.219.81.3
        IQtvZjIdhN.exeGet hashmaliciousBrowse
        • 66.45.248.130
        Req-87086782-8575.htmGet hashmaliciousBrowse
        • 66.45.228.57
        148wWoi8vI.exeGet hashmaliciousBrowse
        • 66.45.248.130
        wZ6ARBLKPj.exeGet hashmaliciousBrowse
        • 69.10.42.234
        Attachments_240369 475265.docGet hashmaliciousBrowse
        • 216.219.81.50
        AGENT APPOINTMENT.xlsmGet hashmaliciousBrowse
        • 216.158.225.211
        isb777amx.exeGet hashmaliciousBrowse
        • 66.23.227.135
        https://venushome-my.sharepoint.com/:b:/g/personal/nsh_venushomeappliances_com/EX5FneZcfnZMndmJcDSa_toBsLtKOV-PlkwfYKs_6Hf8sA?e=I7myHOGet hashmaliciousBrowse
        • 206.72.203.52
        test9.exeGet hashmaliciousBrowse
        • 66.45.228.160
        https://firebasestorage.googleapis.com/v0/b/iouyfgjkgh.appspot.com/o/WEBMAIL.html?alt=media&token=f21ff97e-0c97-456a-9a4b-10962301f5d2#salim.mamlouk@holding-kamph.comGet hashmaliciousBrowse
        • 64.20.38.219
        https://firebasestorage.googleapis.com/v0/b/nnajnr.appspot.com/o/WEBMAIL.html?alt=media&token=de90d2b5-b8b1-4623-87f1-c5411b10395b#asegura@talgo.comGet hashmaliciousBrowse
        • 64.20.38.219

        JA3 Fingerprints

        No context

        Dropped Files

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exePurchase Order PDF pdf.exeGet hashmaliciousBrowse
          Orden CW62125Q, pdf.exeGet hashmaliciousBrowse
            7444478441.jsGet hashmaliciousBrowse
              7444478441.jsGet hashmaliciousBrowse
                7444478441.jsGet hashmaliciousBrowse
                  5HuSdWXs4n.exeGet hashmaliciousBrowse
                    ABU.exeGet hashmaliciousBrowse
                      LI-TAK P0 TVOP CK-20-08-30 203008,pdf.exeGet hashmaliciousBrowse
                        ppp.exeGet hashmaliciousBrowse
                          787774778.jsGet hashmaliciousBrowse
                            12477123690.jsGet hashmaliciousBrowse
                              12477123690.jsGet hashmaliciousBrowse
                                order pdf.exeGet hashmaliciousBrowse
                                  Documents RF V23665.exeGet hashmaliciousBrowse
                                    78547744787.jsGet hashmaliciousBrowse
                                      58669333.jsGet hashmaliciousBrowse
                                        58669333.jsGet hashmaliciousBrowse
                                          78547744787.jsGet hashmaliciousBrowse
                                            78547744787.jsGet hashmaliciousBrowse
                                              order.exeGet hashmaliciousBrowse

                                                Created / dropped Files

                                                C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):69632
                                                Entropy (8bit):5.20894581699571
                                                Encrypted:false
                                                SSDEEP:768:NElGiBcBuiyFjUwF0wdP9/rJMDnRFRJfStGpwV3e3qtAcy:ilGBu7jjP9/tMDn9Jt+VO3GO
                                                MD5:88BBB7610152B48C2B3879473B17857E
                                                SHA1:0F6CF8DD66AA58CE31DA4E8AC0631600EF055636
                                                SHA-256:2C7ACC16D19D076D67E9F1F37984935899B79536C9AC6EEC8850C44D20F87616
                                                SHA-512:5BACDF6C190A76C2C6A9A3519936E08E898AC8A2B1384D60429DF850BE778860435BF9E5EB316517D2345A5AAE201F369863F7A242134253978BCB5B2179CA58
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Joe Sandbox View:
                                                • Filename: Purchase Order PDF pdf.exe, Detection: malicious, Browse
                                                • Filename: Orden CW62125Q, pdf.exe, Detection: malicious, Browse
                                                • Filename: 7444478441.js, Detection: malicious, Browse
                                                • Filename: 7444478441.js, Detection: malicious, Browse
                                                • Filename: 7444478441.js, Detection: malicious, Browse
                                                • Filename: 5HuSdWXs4n.exe, Detection: malicious, Browse
                                                • Filename: ABU.exe, Detection: malicious, Browse
                                                • Filename: LI-TAK P0 TVOP CK-20-08-30 203008,pdf.exe, Detection: malicious, Browse
                                                • Filename: ppp.exe, Detection: malicious, Browse
                                                • Filename: 787774778.js, Detection: malicious, Browse
                                                • Filename: 12477123690.js, Detection: malicious, Browse
                                                • Filename: 12477123690.js, Detection: malicious, Browse
                                                • Filename: order pdf.exe, Detection: malicious, Browse
                                                • Filename: Documents RF V23665.exe, Detection: malicious, Browse
                                                • Filename: 78547744787.js, Detection: malicious, Browse
                                                • Filename: 58669333.js, Detection: malicious, Browse
                                                • Filename: 58669333.js, Detection: malicious, Browse
                                                • Filename: 78547744787.js, Detection: malicious, Browse
                                                • Filename: 78547744787.js, Detection: malicious, Browse
                                                • Filename: order.exe, Detection: malicious, Browse
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....{Z.....................@........... ........@.. .......................@......99....@.....................................S.......`/................... ....................................................... ............... ..H............text....... ...................... ..`.rsrc...`/.......0..................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\MSBuild.exe.log
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):325
                                                Entropy (8bit):5.334380084018418
                                                Encrypted:false
                                                SSDEEP:6:Q3LadLCR22IAQykdL1tZbLsbFLIP12MUAvvro6ysGMFLIP12MUAvvrs:Q3LaJU20NaL1tZbgbe4MqJsGMe4M6
                                                MD5:65CE98936A67552310EFE2F0FF5BDF88
                                                SHA1:8133653A6B9A169C7496ADE315CED322CFC3613A
                                                SHA-256:682F7C55B1B6E189D17755F74959CD08762F91373203B3B982ACFFCADE2E871A
                                                SHA-512:2D00AC024267EC384720A400F6D0B4F7EDDF49FAF8AB3C9E6CBFBBAE90ECADACA9022B33E3E8EC92E4F57C7FC830299C8643235EB4AA7D8A6AFE9DD1775F57C3
                                                Malicious:false
                                                Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..2,"Microsoft.Build.Engine, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build.Framework, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\dhcpmon.exe.log
                                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):441
                                                Entropy (8bit):5.388715099859351
                                                Encrypted:false
                                                SSDEEP:12:Q3LaJU20NaL10U2+gYhD5itZbgbe4MqJsGMe4M6:MLF20NaL32+g2OH4xvn4j
                                                MD5:88F0104DB9A3F9BC4F0FC3805F571B0D
                                                SHA1:CDD4F34385792F0CCE0A844F4ABB447C25AB4E73
                                                SHA-256:F6C11D3D078ED73F2640DA510E68DEEAA5F14F79CAE2E23A254B4E37C7D0230F
                                                SHA-512:04B977F63CAB8DE20EA7EFA9D4299C2E625D92FA6D54CA03EECD9F322E978326B353824F23BEC0E712083BDE0DBC5CC4EE90922137106B096050CA46A166DF0E
                                                Malicious:false
                                                Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\527c933194f3a99a816d83c619a3e1d3\System.Xml.ni.dll",0..2,"Microsoft.Build.Engine, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.Build.Framework, Version=2.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                C:\Users\user\AppData\Local\Temp\27c398b5630447af830b2dd2bc343446.xml
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe
                                                File Type:XML 1.0 document, ASCII text
                                                Category:dropped
                                                Size (bytes):1287
                                                Entropy (8bit):5.229307073850279
                                                Encrypted:false
                                                SSDEEP:24:2do4+S8Tcqd2r6gFwvbIrovlgU3ODOiIQRvh7hwZgvw43aVdyZEiTbn:c+XB2mbIrovl33ODOiLdKZgfoIt/
                                                MD5:17923A8153452A388A2DBDB5AA8118BE
                                                SHA1:B2BAE36FAF1E841516B3B122704C5D3CDE82D4DA
                                                SHA-256:66CC1714F3E1AC319A5FCB027577AFD9E4CEF6E9B03C945D73B7781D030A7D30
                                                SHA-512:6EA5A088FAA554EB447DFDC04CF004278F3578CE66E2E05CA5F0B50A545EC8E7FB9F365446F0867C1D400D8546F55A098A0C5437D24A9FD5FDB3031C9EEEEE99
                                                Malicious:true
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>.<Task version = "1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.<RegistrationInfo>.<Date>2015-09-27T14:27:44.8929027</Date > .<Author>899552\user</Author>.</RegistrationInfo>.<Triggers>.<LogonTrigger>.<Enabled>true</Enabled>.<UserId>899552\user</UserId>.</LogonTrigger>.<RegistrationTrigger>.<Enabled>false</Enabled>.</RegistrationTrigger>.</Triggers>.<Principals>.<Principal id="Author">.<UserId>899552\user</UserId>.<LogonType>InteractiveToken</LogonType>.<RunLevel>LeastPrivilege</RunLevel>.</Principal>.</Principals>.<Settings>.<MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.<AllowHardTerminate>false</AllowHardTerminate>.<StartWhenAvailable>true</StartWhenAvailable>.<RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.<IdleSettings>.<StopOnIdleEnd>true</StopOnIdleEnd>.<RestartOnIdle>false</RestartOnIdle>.</IdleSettings>.<AllowStartOnDemand>true</AllowStartOnDemand>.<Enabled>true</Enabled>.<Hidden>fals
                                                C:\Users\user\AppData\Local\Temp\Temp\images.exe
                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe
                                                File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):271370
                                                Entropy (8bit):7.8736012263539585
                                                Encrypted:false
                                                SSDEEP:6144:Nqh+mUvToYfwuCiXri8Z/0jdKOs1dcxjc15ONu:NcUvTtwVqFZ2Dxjc3y
                                                MD5:0B77D13126DDB4FE1012DEF81EA16914
                                                SHA1:EFC2ABFBA1A703C8F069727CEFC48AA3DF6D0F95
                                                SHA-256:415839939DCFD7D536A5F2BA9BBFFE95B33E6196B8168BAAB617813FF9A75FC9
                                                SHA-512:C5C76E17E5509E6D59885468ED9AEE3920BBEFBF3612DEA63B96649C1424B21E731391CA50A37345F13F0846926AFC069F7AC68535BE351D6555AB0E0A26C8BA
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Avira, Detection: 100%
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 79%
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Zo..4<..4<..4<.<..4<.<..4<.<..4<..O<..4<..5<..4<.<..4<.<..4<.<..4<Rich..4<........................PE..L....._.................f..........~.............@..........................`............@.................................L........@.......................P......................................P...@............................................text...td.......f.................. ..`.rdata........... ...j..............@..@.data...............................@....rsrc........@......................@..@.reloc.......P......................@..B........................................................................................................................................................................................................................................................................................................................
                                                C:\Users\user\AppData\Local\Temp\tmp182E.tmp
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1320
                                                Entropy (8bit):5.136963558289723
                                                Encrypted:false
                                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mnc2xtn:cbk4oL600QydbQxIYODOLedq3ZLj
                                                MD5:AE766004C0D8792953BAFFFE8F6A2E3B
                                                SHA1:14B12F27543A401E2FE0AF8052E116CAB0032426
                                                SHA-256:1ABDD9B6A6B84E4BA1AF1282DC84CE276C59BA253F4C4AF05FEA498A4FD99540
                                                SHA-512:E530DA4A5D4336FC37838D0E93B5EB3804B9C489C71F6954A47FC81A4C655BB72EC493E109CF96E6E3617D7623AC80697AD3BBD5FFC6281BAFC8B34DCA5E6567
                                                Malicious:true
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                C:\Users\user\AppData\Local\Temp\tmp1B1D.tmp
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1310
                                                Entropy (8bit):5.109425792877704
                                                Encrypted:false
                                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                Malicious:false
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):232
                                                Entropy (8bit):7.089541637477408
                                                Encrypted:false
                                                SSDEEP:3:XrURGizD7cnRNGbgCFKRNX/pBK0jCV83ne+VdWPiKgmR7kkmefoeLBizbCuVkqYM:X4LDAnybgCFcps0OafmCYDlizZr/i/Oh
                                                MD5:9E7D0351E4DF94A9B0BADCEB6A9DB963
                                                SHA1:76C6A69B1C31CEA2014D1FD1E222A3DD1E433005
                                                SHA-256:AAFC7B40C5FE680A2BB549C3B90AABAAC63163F74FFFC0B00277C6BBFF88B757
                                                SHA-512:93CCF7E046A3C403ECF8BC4F1A8850BA0180FE18926C98B297C5214EB77BC212C8FBCC58412D0307840CF2715B63BE68BACDA95AA98E82835C5C53F17EF38511
                                                Malicious:false
                                                Preview: Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.... S....}FF.2...h.M+....L.#.X..+......*....~f.G0^..;....W2.=...K.~.L..&f...p............:7rH}..../H......L...?...A.K...J.=8x!....+.2e'..E?.G......[.&
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                File Type:Non-ISO extended-ASCII text, with no line terminators, with overstriking
                                                Category:dropped
                                                Size (bytes):8
                                                Entropy (8bit):3.0
                                                Encrypted:false
                                                SSDEEP:3:zrDP:fDP
                                                MD5:06FC58F9927778A61F43FE9613879AF5
                                                SHA1:5AB2C91B11AB018ADE2B61CE0AB5C87800FA0046
                                                SHA-256:19C6998695CA227D07148CEDF0DE018EDD4FB5F99B46AABAC9964B30483EA378
                                                SHA-512:DE1AA02C219A2583FCBEB941CBEB4230D3E4E3EAB985BE0AFDF06E3D5BCC45CE0A8921DD71852C07F8CA0F353BBD90A0C2100B58B5EA255CEE759F2836F4C41A
                                                Malicious:true
                                                Preview: .k.....H
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):40
                                                Entropy (8bit):5.153055907333276
                                                Encrypted:false
                                                SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
                                                MD5:4E5E92E2369688041CC82EF9650EDED2
                                                SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
                                                SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
                                                SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
                                                Malicious:false
                                                Preview: 9iH...}Z.4..f.~a........~.~.......3.U.
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):426832
                                                Entropy (8bit):7.999527918131335
                                                Encrypted:true
                                                SSDEEP:6144:zKfHbamD8WN+JQYrjM7Ei2CsFJjyh9zvgPonV5HqZcPVT4Eb+Z6no3QSzjeMsdF/:zKf137EiDsTjevgArYcPVLoTQS+0iv
                                                MD5:653DDDCB6C89F6EC51F3DDC0053C5914
                                                SHA1:4CF7E7D42495CE01C261E4C5C4B8BF6CD76CCEE5
                                                SHA-256:83B9CAE66800C768887FB270728F6806CBEBDEAD9946FA730F01723847F17FF9
                                                SHA-512:27A467F2364C21CD1C6C34EF1CA5FFB09B4C3180FC9C025E293374EB807E4382108617BB4B97F8EBBC27581CD6E5988BB5E21276B3CB829C1C0E49A6FC9463A0
                                                Malicious:false
                                                Preview: ..g&jo...IPg...GM....R>i...o...I.>.&.r{....8...}...E....v.!7.u3e.. .....db...}.......".t(.xC9.cp.B....7...'.......%......w.^.._.......B.W%.<..i.0.{9.xS...5...)..w..$..C..?`F..u.5.T.X.w'Si..z.n{...Y!m...RA...xg....[7...z..9@.K.-...T..+.ACe....R....enO.....AoNMT.\^....}H&..4I...B.:..@..J...v..rI5..kP......2j....B..B.~.T..>.c..emW;Rn<9..[.r.o....R[....@=...:...L.g<.....I..%4[.G^.~.l'......v.p&.........+..S...9d/.{..H.`@.1..........f.\s...X.a.].<.h*...J4*...k.x....%3.......3.c..?%....>.!.}..)(.{...H...3..`'].Q.[sN..JX(.%pH....+......(...v.....H...3..8.a_..J..?4...y.N(..D.*h..g.jD..I...44Q?..N......oX.A......l...n?./..........$.!..;.^9"H........*...OkF....v.m_.e.v..f...."..bq{.....O.-....%R+...-..P.i..t5....2Z# ...#...,L..{..j..heT -=Z.P;...g.m)<owJ].J..../.p..8.u8.&..#.m9...j%..g&....g.x.I,....u.[....>./W...........*X...b*Z...ex.0..x.}.....Tb...[..H_M._.^N.d&...g._."@4N.pDs].GbT.......&p........Nw...%$=.....{..J.1....2....<E{..<!G..
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                Process:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):57
                                                Entropy (8bit):4.85263908467479
                                                Encrypted:false
                                                SSDEEP:3:oMty8WbSI1u:oMLWuI1u
                                                MD5:A35128E4E28B27328F70E4E8FF482443
                                                SHA1:B89066B2F8DB34299AABFD7ABEE402D5444DD079
                                                SHA-256:88AEA00733DC4B570A29D56A423CC5BF163E5ACE7AF349972EB0BBA8D9AD06E1
                                                SHA-512:F098E844B5373B34642B49B6E0F2E15CFDAA1A8B6CABC2196CEC0F3765289E5B1FD4AB588DD65F97C8E51FA9A81077621E9A06946859F296904C646906A70F33
                                                Malicious:false
                                                Preview: C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                \Device\ConDrv
                                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):306
                                                Entropy (8bit):4.969261552825097
                                                Encrypted:false
                                                SSDEEP:6:zx3M1tlAX8bSWR30qysGMQbSVRRZBXVRbJ0fFdCsq2UTiMdH8stCal+n:zK1XnV30ZsGMIG9BFRbQdCT2UftCM+
                                                MD5:F227448515085A647910907084E6728E
                                                SHA1:5FA1A8E28B084DA25A1BBC51A2D75810CEF57E2C
                                                SHA-256:662BA47D628FE8EBE95DD47B4482110A10B49AED09387BC0E028BB66E68E20BD
                                                SHA-512:6F6E5DFFF7B17C304FB19B0BA5466AF84EF98A5C2EFA573AF72CFD3ED6964E9FD7F8E4B79FCFFBEF87CE545418C69D4984F4DD60BBF457D0A3640950F8FC5AF0
                                                Malicious:false
                                                Preview: Microsoft (R) Build Engine Version 2.0.50727.8922..[Microsoft .NET Framework, Version 2.0.50727.8922]..Copyright (C) Microsoft Corporation 2005. All rights reserved.....MSBUILD : error MSB1003: Specify a project or solution file. The current working directory does not contain a project or solution file...

                                                Static File Info

                                                General

                                                File type:PE32 executable (console) Intel 80386, for MS Windows
                                                Entropy (8bit):7.873728502504083
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe
                                                File size:271360
                                                MD5:ee4555ac614048e36aae067b6a032951
                                                SHA1:c7559fe7c094d4643ea3ab09c071fa0ac8ec18a4
                                                SHA256:3a2278374596d368ec773c10d54ec91f69445144248769abb155de58215d8c2c
                                                SHA512:620f7a6440caa0d16dc3e466b4078850d76e05c292d92225046d1ba1672a4ff550f601418344637554ab046ed1c96864c00702c75e6f5fb3b42454985ebcc03d
                                                SSDEEP:6144:Nqh+mUvToYfwuCiXri8Z/0jdKOs1dcxjc15ONu:NcUvTtwVqFZ2Dxjc3y
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Zo..4<..4<..4<...<..4<...<..4<...<..4<..O<..4<..5<..4<...<..4<...<..4<...<..4<Rich..4<........................PE..L......_...

                                                File Icon

                                                Icon Hash:00828e8e8686b000

                                                Static PE Info

                                                General

                                                Entrypoint:0x40147e
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows cui
                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                Time Stamp:0x5FBBD6F3 [Mon Nov 23 15:36:19 2020 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:5
                                                OS Version Minor:0
                                                File Version Major:5
                                                File Version Minor:0
                                                Subsystem Version Major:5
                                                Subsystem Version Minor:0
                                                Import Hash:b0701deda97f8f775ded6a80cfec3216

                                                Entrypoint Preview

                                                Instruction
                                                call 00007F9360F8323Eh
                                                jmp 00007F9360F81A49h
                                                mov edi, edi
                                                push ebp
                                                mov ebp, esp
                                                sub esp, 00000328h
                                                mov dword ptr [00442778h], eax
                                                mov dword ptr [00442774h], ecx
                                                mov dword ptr [00442770h], edx
                                                mov dword ptr [0044276Ch], ebx
                                                mov dword ptr [00442768h], esi
                                                mov dword ptr [00442764h], edi
                                                mov word ptr [00442790h], ss
                                                mov word ptr [00442784h], cs
                                                mov word ptr [00442760h], ds
                                                mov word ptr [0044275Ch], es
                                                mov word ptr [00442758h], fs
                                                mov word ptr [00442754h], gs
                                                pushfd
                                                pop dword ptr [00442788h]
                                                mov eax, dword ptr [ebp+00h]
                                                mov dword ptr [0044277Ch], eax
                                                mov eax, dword ptr [ebp+04h]
                                                mov dword ptr [00442780h], eax
                                                lea eax, dword ptr [ebp+08h]
                                                mov dword ptr [0044278Ch], eax
                                                mov eax, dword ptr [ebp-00000320h]
                                                mov dword ptr [004426C8h], 00010001h
                                                mov eax, dword ptr [00442780h]
                                                mov dword ptr [0044267Ch], eax
                                                mov dword ptr [00442670h], C0000409h
                                                mov dword ptr [00442674h], 00000001h
                                                mov eax, dword ptr [0040A004h]
                                                mov dword ptr [ebp-00000328h], eax
                                                mov eax, dword ptr [0040A008h]
                                                mov dword ptr [ebp-00000324h], eax
                                                call dword ptr [00000090h]

                                                Rich Headers

                                                Programming Language:
                                                • [ C ] VS2008 build 21022
                                                • [LNK] VS2008 build 21022
                                                • [ASM] VS2008 build 21022
                                                • [IMP] VS2005 build 50727
                                                • [RES] VS2008 build 21022
                                                • [C++] VS2008 build 21022

                                                Data Directories

                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x964c0xa0.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x440000x10.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x450000x70c.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x93500x40.rdata
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x198.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                Sections

                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x64740x6600False0.612132352941data6.57687344022IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                .rdata0x80000x1fc00x2000False0.36865234375data5.50028935513IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0xa0000x391fc0x38800False0.983156457412data7.98418937184IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                                .rsrc0x440000x100x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x450000xeda0x1000False0.39306640625data3.79564261107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                Imports

                                                DLLImport
                                                KERNEL32.dllGetConsoleWindow, GetProcAddress, LoadLibraryA, CloseHandle, GetStringTypeW, GetStringTypeA, LCMapStringW, MultiByteToWideChar, LCMapStringA, GetLocaleInfoA, HeapSize, RtlUnwind, HeapReAlloc, VirtualAlloc, HeapAlloc, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, InitializeCriticalSectionAndSpinCount, EnterCriticalSection, LeaveCriticalSection, GetSystemTimeAsFileTime, GetCurrentProcessId, GetTickCount, QueryPerformanceCounter, HeapFree, VirtualFree, HeapCreate, InterlockedDecrement, GetCurrentThreadId, GetCommandLineA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetModuleHandleW, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetLastError, GetEnvironmentStringsW, SetHandleCount, GetFileType, GetStartupInfoA, DeleteCriticalSection, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError
                                                MSACM32.dllacmMetrics, acmStreamReset, acmFilterChooseW, acmDriverOpen, acmDriverDetailsW
                                                RPCRT4.dllI_RpcNsBindingSetEntryNameW, NdrComplexArrayBufferSize, I_RpcIfInqTransferSyntaxes, RpcBindingServerFromClient, NDRSContextMarshall, RpcRevertToSelfEx
                                                OLEAUT32.dllVarCyFromUI4, VarDecFromDate, LPSAFEARRAY_UserUnmarshal, OleLoadPictureEx, VarR4FromBool
                                                WINMM.dllmmioDescend, mixerGetLineInfoA, mmioInstallIOProcA, midiInGetErrorTextA, mmTaskCreate, waveInGetErrorTextA, waveOutGetPosition, mmioAdvance
                                                MPR.dllWNetCancelConnection2A, WNetCancelConnectionA, WNetGetResourceParentA, WNetConnectionDialog1A, WNetGetResourceParentW, WNetDisconnectDialog1W, WNetUseConnectionA, WNetConnectionDialog, WNetGetUniversalNameA, WNetGetProviderNameA
                                                USER32.dllShowWindow, CallWindowProcW

                                                Network Behavior

                                                Snort IDS Alerts

                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                11/28/20-17:49:17.283033TCP2025019ET TROJAN Possible NanoCore C2 60B4972324980192.168.2.3209.159.151.5

                                                Network Port Distribution

                                                TCP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Nov 28, 2020 17:49:01.251102924 CET44349690204.79.197.200192.168.2.3
                                                Nov 28, 2020 17:49:01.251230001 CET49690443192.168.2.3204.79.197.200
                                                Nov 28, 2020 17:49:17.149760962 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.253833055 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.253953934 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.283032894 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.404994011 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.405109882 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.563344955 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.563474894 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.667670965 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.714481115 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.721899033 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.875973940 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.892357111 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.892399073 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.892425060 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.892448902 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.892474890 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.892473936 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.892501116 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.892508030 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.892524004 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.892549992 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.892570972 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.892574072 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.892599106 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.892611027 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.892659903 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.996613026 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.996649981 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.996675014 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.996706009 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.996733904 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.996757030 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.996783018 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.996788025 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.996809959 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.996814966 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.996834993 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.996848106 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.996860981 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.996865988 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.996889114 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.996913910 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.996916056 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.996942043 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.996967077 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.996968985 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.996990919 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.997015953 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.997015953 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.997066021 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.997108936 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.997133970 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.997165918 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.997184992 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:17.997190952 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:17.997246027 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:18.101255894 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101305962 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101335049 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101358891 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101376057 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:18.101414919 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101430893 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:18.101443052 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101464987 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101485968 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101509094 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:18.101511002 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101536989 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101547956 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:18.101561069 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101583958 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101591110 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:18.101610899 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101635933 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101649046 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:18.101659060 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101684093 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101696014 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:18.101702929 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101728916 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101733923 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:18.101752996 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101775885 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101792097 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:18.101802111 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101830959 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101836920 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:18.101855993 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101882935 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101887941 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:18.101910114 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101938963 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101943970 CET4972324980192.168.2.3209.159.151.5
                                                Nov 28, 2020 17:49:18.101964951 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101989985 CET2498049723209.159.151.5192.168.2.3
                                                Nov 28, 2020 17:49:18.101989985 CET4972324980192.168.2.3209.159.151.5

                                                UDP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Nov 28, 2020 17:49:01.365673065 CET6083153192.168.2.38.8.8.8
                                                Nov 28, 2020 17:49:01.392847061 CET53608318.8.8.8192.168.2.3
                                                Nov 28, 2020 17:49:02.188767910 CET6010053192.168.2.38.8.8.8
                                                Nov 28, 2020 17:49:02.215718985 CET53601008.8.8.8192.168.2.3
                                                Nov 28, 2020 17:49:02.833033085 CET5319553192.168.2.38.8.8.8
                                                Nov 28, 2020 17:49:02.860352039 CET53531958.8.8.8192.168.2.3
                                                Nov 28, 2020 17:49:03.668102026 CET5014153192.168.2.38.8.8.8
                                                Nov 28, 2020 17:49:03.695293903 CET53501418.8.8.8192.168.2.3
                                                Nov 28, 2020 17:49:04.472825050 CET5302353192.168.2.38.8.8.8
                                                Nov 28, 2020 17:49:04.499989986 CET53530238.8.8.8192.168.2.3
                                                Nov 28, 2020 17:49:05.205583096 CET4956353192.168.2.38.8.8.8
                                                Nov 28, 2020 17:49:05.245820999 CET53495638.8.8.8192.168.2.3
                                                Nov 28, 2020 17:49:06.089550972 CET5135253192.168.2.38.8.8.8
                                                Nov 28, 2020 17:49:06.116694927 CET53513528.8.8.8192.168.2.3
                                                Nov 28, 2020 17:49:06.884823084 CET5934953192.168.2.38.8.8.8
                                                Nov 28, 2020 17:49:06.912450075 CET53593498.8.8.8192.168.2.3
                                                Nov 28, 2020 17:49:07.798429012 CET5708453192.168.2.38.8.8.8
                                                Nov 28, 2020 17:49:07.825588942 CET53570848.8.8.8192.168.2.3
                                                Nov 28, 2020 17:49:08.470161915 CET5882353192.168.2.38.8.8.8
                                                Nov 28, 2020 17:49:08.497859955 CET53588238.8.8.8192.168.2.3
                                                Nov 28, 2020 17:49:09.148407936 CET5756853192.168.2.38.8.8.8
                                                Nov 28, 2020 17:49:09.175578117 CET53575688.8.8.8192.168.2.3
                                                Nov 28, 2020 17:49:28.395394087 CET5054053192.168.2.38.8.8.8
                                                Nov 28, 2020 17:49:28.422703981 CET53505408.8.8.8192.168.2.3
                                                Nov 28, 2020 17:49:35.464407921 CET5436653192.168.2.38.8.8.8
                                                Nov 28, 2020 17:49:35.504997015 CET53543668.8.8.8192.168.2.3
                                                Nov 28, 2020 17:49:47.695863008 CET5303453192.168.2.38.8.8.8
                                                Nov 28, 2020 17:49:47.739499092 CET53530348.8.8.8192.168.2.3
                                                Nov 28, 2020 17:49:50.130630016 CET5776253192.168.2.38.8.8.8
                                                Nov 28, 2020 17:49:50.167737007 CET53577628.8.8.8192.168.2.3
                                                Nov 28, 2020 17:50:02.806616068 CET5543553192.168.2.38.8.8.8
                                                Nov 28, 2020 17:50:02.833656073 CET53554358.8.8.8192.168.2.3
                                                Nov 28, 2020 17:50:07.385375977 CET5071353192.168.2.38.8.8.8
                                                Nov 28, 2020 17:50:07.412429094 CET53507138.8.8.8192.168.2.3
                                                Nov 28, 2020 17:50:37.652371883 CET5613253192.168.2.38.8.8.8
                                                Nov 28, 2020 17:50:37.679497957 CET53561328.8.8.8192.168.2.3
                                                Nov 28, 2020 17:50:39.390965939 CET5898753192.168.2.38.8.8.8
                                                Nov 28, 2020 17:50:39.426575899 CET53589878.8.8.8192.168.2.3

                                                Code Manipulations

                                                Statistics

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:17:49:06
                                                Start date:28/11/2020
                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownLoader36.7233.23906.exe'
                                                Imagebase:0x320000
                                                File size:271360 bytes
                                                MD5 hash:EE4555AC614048E36AAE067B6A032951
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.220940423.000000000032A000.00000004.00020000.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.220940423.000000000032A000.00000004.00020000.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.220940423.000000000032A000.00000004.00020000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                Reputation:low

                                                General

                                                Start time:17:49:07
                                                Start date:28/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6b2800000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:17:49:12
                                                Start date:28/11/2020
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:cmd /c schtasks /Create /TN images /XML 'C:\Users\user\AppData\Local\Temp\27c398b5630447af830b2dd2bc343446.xml'
                                                Imagebase:0xbd0000
                                                File size:232960 bytes
                                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:17:49:12
                                                Start date:28/11/2020
                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                Imagebase:0x8e0000
                                                File size:69632 bytes
                                                MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: NanoCore, Description: unknown, Source: 00000003.00000003.228783921.0000000004481000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                Reputation:moderate

                                                General

                                                Start time:17:49:13
                                                Start date:28/11/2020
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:schtasks /Create /TN images /XML 'C:\Users\user\AppData\Local\Temp\27c398b5630447af830b2dd2bc343446.xml'
                                                Imagebase:0xb40000
                                                File size:185856 bytes
                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:17:49:15
                                                Start date:28/11/2020
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp182E.tmp'
                                                Imagebase:0xb40000
                                                File size:185856 bytes
                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:17:49:15
                                                Start date:28/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6b2800000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:17:49:15
                                                Start date:28/11/2020
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp1B1D.tmp'
                                                Imagebase:0xb40000
                                                File size:185856 bytes
                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:17:49:16
                                                Start date:28/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6b2800000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:17:49:16
                                                Start date:28/11/2020
                                                Path:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe 0
                                                Imagebase:0x9d0000
                                                File size:69632 bytes
                                                MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET

                                                General

                                                Start time:17:49:17
                                                Start date:28/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6b2800000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:17:49:17
                                                Start date:28/11/2020
                                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                Imagebase:0x4c0000
                                                File size:69632 bytes
                                                MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Antivirus matches:
                                                • Detection: 0%, Metadefender, Browse
                                                • Detection: 0%, ReversingLabs

                                                General

                                                Start time:17:49:17
                                                Start date:28/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6b2800000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                General

                                                Start time:17:49:27
                                                Start date:28/11/2020
                                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                Imagebase:0x890000
                                                File size:69632 bytes
                                                MD5 hash:88BBB7610152B48C2B3879473B17857E
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET

                                                General

                                                Start time:17:49:27
                                                Start date:28/11/2020
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6b2800000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language

                                                Disassembly

                                                Code Analysis

                                                Reset < >