Loading ...

Play interactive tourEdit tour

Analysis Report DES_ Holdings Ltd - products listing.exe

Overview

General Information

Sample Name:DES_ Holdings Ltd - products listing.exe
Analysis ID:336707
MD5:a07c438611c59fad6083faf789d40917
SHA1:4bd9fcd0d981c75a4c875b0ca0f995957fd94bf9
SHA256:7bfe37fe1a33afd35833f4085fed761a854dd617df861a10fb7ad4e25d0f78a9
Tags:exeNanoCoreRAT

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

Startup

  • System is w10x64
  • DES_ Holdings Ltd - products listing.exe (PID: 7084 cmdline: 'C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe' MD5: A07C438611C59FAD6083FAF789D40917)
    • schtasks.exe (PID: 6616 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gkzqjVdPrQY' /XML 'C:\Users\user\AppData\Local\Temp\tmp6AF5.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 6296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"C2: ": ["212.83.46.26:4021", "212.83.46.26", "127.0.0.1:4021"], "Version: ": "NanoCore Client, Version=1.2.2.0"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000007.00000002.706915197.00000000058D0000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xe75:$x1: NanoCore.ClientPluginHost
  • 0xe8f:$x2: IClientNetworkHost
00000007.00000002.706915197.00000000058D0000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xe75:$x2: NanoCore.ClientPluginHost
  • 0x1261:$s3: PipeExists
  • 0x1136:$s4: PipeCreated
  • 0xeb0:$s5: IClientLoggingHost
00000007.00000002.700133905.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xff8d:$x1: NanoCore.ClientPluginHost
  • 0xffca:$x2: IClientNetworkHost
  • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000007.00000002.700133905.0000000000402000.00000040.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000007.00000002.700133905.0000000000402000.00000040.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xfcf5:$a: NanoCore
    • 0xfd05:$a: NanoCore
    • 0xff39:$a: NanoCore
    • 0xff4d:$a: NanoCore
    • 0xff8d:$a: NanoCore
    • 0xfd54:$b: ClientPlugin
    • 0xff56:$b: ClientPlugin
    • 0xff96:$b: ClientPlugin
    • 0xfe7b:$c: ProjectData
    • 0x10882:$d: DESCrypto
    • 0x1824e:$e: KeepAlive
    • 0x1623c:$g: LogClientMessage
    • 0x12437:$i: get_Connected
    • 0x10bb8:$j: #=q
    • 0x10be8:$j: #=q
    • 0x10c04:$j: #=q
    • 0x10c34:$j: #=q
    • 0x10c50:$j: #=q
    • 0x10c6c:$j: #=q
    • 0x10c9c:$j: #=q
    • 0x10cb8:$j: #=q
    Click to see the 8 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    7.2.DES_ Holdings Ltd - products listing.exe.58d0000.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    7.2.DES_ Holdings Ltd - products listing.exe.58d0000.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xd9ad:$x1: NanoCore.ClientPluginHost
    • 0xd9da:$x2: IClientNetworkHost
    7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xd9ad:$x2: NanoCore.ClientPluginHost
    • 0xea88:$s4: PipeCreated
    • 0xd9c7:$s5: IClientLoggingHost
    7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 7 entries

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe, ProcessId: 6432, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Sigma detected: Scheduled temp file as task from temp locationShow sources
      Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gkzqjVdPrQY' /XML 'C:\Users\user\AppData\Local\Temp\tmp6AF5.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gkzqjVdPrQY' /XML 'C:\Users\user\AppData\Local\Temp\tmp6AF5.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe' , ParentImage: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe, ParentProcessId: 7084, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gkzqjVdPrQY' /XML 'C:\Users\user\AppData\Local\Temp\tmp6AF5.tmp', ProcessId: 6616

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: DES_ Holdings Ltd - products listing.exe.6432.7.memstrMalware Configuration Extractor: NanoCore {"C2: ": ["212.83.46.26:4021", "212.83.46.26", "127.0.0.1:4021"], "Version: ": "NanoCore Client, Version=1.2.2.0"}
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\gkzqjVdPrQY.exeVirustotal: Detection: 27%Perma Link
      Source: C:\Users\user\AppData\Roaming\gkzqjVdPrQY.exeReversingLabs: Detection: 23%
      Multi AV Scanner detection for submitted fileShow sources
      Source: DES_ Holdings Ltd - products listing.exeVirustotal: Detection: 27%Perma Link
      Source: DES_ Holdings Ltd - products listing.exeReversingLabs: Detection: 23%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000007.00000002.700133905.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.707188202.00000000062C0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.705609344.0000000004139000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: DES_ Holdings Ltd - products listing.exe PID: 6432, type: MEMORY
      Source: Yara matchFile source: 7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.DES_ Holdings Ltd - products listing.exe.400000.0.unpack, type: UNPACKEDPE
      Machine Learning detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\gkzqjVdPrQY.exeJoe Sandbox ML: detected
      Machine Learning detection for sampleShow sources
      Source: DES_ Holdings Ltd - products listing.exeJoe Sandbox ML: detected
      Source: 7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.unpackAvira: Label: TR/NanoCore.fadte
      Source: 7.2.DES_ Holdings Ltd - products listing.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: DES_ Holdings Ltd - products listing.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: DES_ Holdings Ltd - products listing.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorIPs: 212.83.46.26:4021
      Source: Malware configuration extractorIPs: 212.83.46.26
      Source: Malware configuration extractorIPs: 127.0.0.1:4021
      Source: global trafficTCP traffic: 192.168.2.6:49733 -> 212.83.46.26:4021
      Source: Joe Sandbox ViewASN Name: TTMDE TTMDE
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.707188202.00000000062C0000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000007.00000002.700133905.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.707188202.00000000062C0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.705609344.0000000004139000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: DES_ Holdings Ltd - products listing.exe PID: 6432, type: MEMORY
      Source: Yara matchFile source: 7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.DES_ Holdings Ltd - products listing.exe.400000.0.unpack, type: UNPACKEDPE

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000007.00000002.706915197.00000000058D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000002.700133905.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000002.700133905.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000007.00000002.707188202.00000000062C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000007.00000002.705609344.0000000004139000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: DES_ Holdings Ltd - products listing.exe PID: 6432, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: DES_ Holdings Ltd - products listing.exe PID: 6432, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 7.2.DES_ Holdings Ltd - products listing.exe.58d0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.DES_ Holdings Ltd - products listing.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 7.2.DES_ Holdings Ltd - products listing.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeCode function: 7_2_00C92050
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeCode function: 7_2_02EDE480
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeCode function: 7_2_02EDE471
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeCode function: 7_2_02EDBBD4
      Source: DES_ Holdings Ltd - products listing.exe, 00000000.00000000.334769368.000000000079A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIServerResponseChannelSinkStack.exe4 vs DES_ Holdings Ltd - products listing.exe
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.707188202.00000000062C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs DES_ Holdings Ltd - products listing.exe
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.707188202.00000000062C0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs DES_ Holdings Ltd - products listing.exe
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.707057225.00000000061D0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs DES_ Holdings Ltd - products listing.exe
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000000.392563180.0000000000D6A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameIServerResponseChannelSinkStack.exe4 vs DES_ Holdings Ltd - products listing.exe
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.705609344.0000000004139000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs DES_ Holdings Ltd - products listing.exe
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.707511238.0000000006C90000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs DES_ Holdings Ltd - products listing.exe
      Source: DES_ Holdings Ltd - products listing.exeBinary or memory string: OriginalFilenameIServerResponseChannelSinkStack.exe4 vs DES_ Holdings Ltd - products listing.exe
      Source: DES_ Holdings Ltd - products listing.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 00000007.00000002.706915197.00000000058D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.706915197.00000000058D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000007.00000002.700133905.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.700133905.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000007.00000002.707188202.00000000062C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000007.00000002.707188202.00000000062C0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000007.00000002.705609344.0000000004139000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: DES_ Holdings Ltd - products listing.exe PID: 6432, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: DES_ Holdings Ltd - products listing.exe PID: 6432, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 7.2.DES_ Holdings Ltd - products listing.exe.58d0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.DES_ Holdings Ltd - products listing.exe.58d0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.DES_ Holdings Ltd - products listing.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 7.2.DES_ Holdings Ltd - products listing.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 7.2.DES_ Holdings Ltd - products listing.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: DES_ Holdings Ltd - products listing.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: gkzqjVdPrQY.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal100.troj.evad.winEXE@6/5@0/4
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeFile created: C:\Users\user\AppData\Roaming\gkzqjVdPrQY.exeJump to behavior
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeMutant created: \Sessions\1\BaseNamedObjects\GqBuxGXRxYuHQUrxadOd
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6296:120:WilError_01
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{3b0a05ab-e8be-49ea-960f-63681280e339}
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeFile created: C:\Users\user\AppData\Local\Temp\tmp6AF5.tmpJump to behavior
      Source: DES_ Holdings Ltd - products listing.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: DES_ Holdings Ltd - products listing.exeVirustotal: Detection: 27%
      Source: DES_ Holdings Ltd - products listing.exeReversingLabs: Detection: 23%
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeFile read: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe 'C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe'
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gkzqjVdPrQY' /XML 'C:\Users\user\AppData\Local\Temp\tmp6AF5.tmp'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gkzqjVdPrQY' /XML 'C:\Users\user\AppData\Local\Temp\tmp6AF5.tmp'
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess created: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: DES_ Holdings Ltd - products listing.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: DES_ Holdings Ltd - products listing.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: DES_ Holdings Ltd - products listing.exe, EnumeratorDropIndices.cs.Net Code: DiscardableAttribute System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: gkzqjVdPrQY.exe.0.dr, EnumeratorDropIndices.cs.Net Code: DiscardableAttribute System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 0.0.DES_ Holdings Ltd - products listing.exe.6c0000.0.unpack, EnumeratorDropIndices.cs.Net Code: DiscardableAttribute System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 7.2.DES_ Holdings Ltd - products listing.exe.c90000.1.unpack, EnumeratorDropIndices.cs.Net Code: DiscardableAttribute System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 7.0.DES_ Holdings Ltd - products listing.exe.c90000.0.unpack, EnumeratorDropIndices.cs.Net Code: DiscardableAttribute System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: initial sampleStatic PE information: section name: .text entropy: 7.50814730642
      Source: initial sampleStatic PE information: section name: .text entropy: 7.50814730642
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeFile created: \des_ holdings ltd - products listing.exe
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeFile created: \des_ holdings ltd - products listing.exe
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeFile created: C:\Users\user\AppData\Roaming\gkzqjVdPrQY.exeJump to dropped file

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gkzqjVdPrQY' /XML 'C:\Users\user\AppData\Local\Temp\tmp6AF5.tmp'

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeFile opened: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeWindow / User API: threadDelayed 2462
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeWindow / User API: threadDelayed 7111
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeWindow / User API: foregroundWindowGot 1150
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeWindow / User API: foregroundWindowGot 380
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe TID: 7088Thread sleep time: -50668s >= -30000s
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe TID: 7108Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe TID: 6476Thread sleep time: -12912720851596678s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.707511238.0000000006C90000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.707511238.0000000006C90000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.707511238.0000000006C90000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.700925338.00000000013A2000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.707511238.0000000006C90000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeMemory written: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe base: 400000 value starts with: 4D5A
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gkzqjVdPrQY' /XML 'C:\Users\user\AppData\Local\Temp\tmp6AF5.tmp'
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeProcess created: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.701996033.00000000031B7000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.701346125.0000000001A80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.701346125.0000000001A80000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.701996033.00000000031B7000.00000004.00000001.sdmpBinary or memory string: Program Manager|$
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.701346125.0000000001A80000.00000002.00000001.sdmpBinary or memory string: &Program Manager
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.701346125.0000000001A80000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.707039779.00000000061CB000.00000004.00000001.sdmpBinary or memory string: Program Manager|
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeQueries volume information: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe VolumeInformation
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeQueries volume information: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe VolumeInformation
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000007.00000002.700133905.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.707188202.00000000062C0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.705609344.0000000004139000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: DES_ Holdings Ltd - products listing.exe PID: 6432, type: MEMORY
      Source: Yara matchFile source: 7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.DES_ Holdings Ltd - products listing.exe.400000.0.unpack, type: UNPACKEDPE

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.707188202.00000000062C0000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: DES_ Holdings Ltd - products listing.exe, 00000007.00000002.705609344.0000000004139000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000007.00000002.700133905.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.707188202.00000000062C0000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000007.00000002.705609344.0000000004139000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: DES_ Holdings Ltd - products listing.exe PID: 6432, type: MEMORY
      Source: Yara matchFile source: 7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 7.2.DES_ Holdings Ltd - products listing.exe.400000.0.unpack, type: UNPACKEDPE

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection112Masquerading1Input Capture11Security Software Discovery111Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Virtualization/Sandbox Evasion3LSASS MemoryVirtualization/Sandbox Evasion3Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection112NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptHidden Files and Directories1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing13DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      DES_ Holdings Ltd - products listing.exe27%VirustotalBrowse
      DES_ Holdings Ltd - products listing.exe24%ReversingLabsByteCode-MSIL.Trojan.Taskun
      DES_ Holdings Ltd - products listing.exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\gkzqjVdPrQY.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\gkzqjVdPrQY.exe27%VirustotalBrowse
      C:\Users\user\AppData\Roaming\gkzqjVdPrQY.exe24%ReversingLabsByteCode-MSIL.Trojan.Taskun

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      7.2.DES_ Holdings Ltd - products listing.exe.62c0000.6.unpack100%AviraTR/NanoCore.fadteDownload File
      7.2.DES_ Holdings Ltd - products listing.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

      Domains

      No Antivirus matches

      URLs

      No Antivirus matches

      Domains and IPs

      Contacted Domains

      No contacted domains info

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      212.83.46.26:4021
      unknownunknown
      unknownunknowntrue
      212.83.46.26
      unknownGermany
      47447TTMDEtrue

      Private

      IP
      127.0.0.1:4021
      127.0.0.1

      General Information

      Joe Sandbox Version:31.0.0 Red Diamond
      Analysis ID:336707
      Start date:06.01.2021
      Start time:17:49:13
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 7m 43s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:DES_ Holdings Ltd - products listing.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:22
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.troj.evad.winEXE@6/5@0/4
      EGA Information:Failed
      HDC Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .exe
      Warnings:
      Show All
      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.

      Simulations

      Behavior and APIs

      TimeTypeDescription
      17:50:25API Interceptor1192x Sleep call for process: DES_ Holdings Ltd - products listing.exe modified

      Joe Sandbox View / Context

      IPs

      No context

      Domains

      No context

      ASN

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      TTMDEhttps://wearemondaymorning.com/?email=alabdullaah@qcb.gov.qaGet hashmaliciousBrowse
      • 91.216.248.23
      https://u5827342.ct.sendgrid.net/ls/click?upn=ZYh6DIqA4xFmr84ZswpQ4c7ONXu2767hYXZwjBnWOY1JkdxAPQD-2Fy87STH2Xf5tCCv1Cfr7SK5QugA1gtf5hkg-3D-3Dr4Nw_DjWowFHgGKgaKR9KzEYTR3nC3p1AWGbaYDP6e93ZAEhNXUTlygFT7vEfeXJ-2FNinzoSEU8wjkiLZ-2Bj7exG0PiN7C92INCv5B1zQa4g83-2Ba0GFHBdwZkJ1voppTs162kZzXHlYGblxkHafYbaoPEnOE3v4nRdYqpT6uzb2BlJNElCCZ2m51yxYwgCwRvlrdJPPvzbuawtl4F-2B3DK6fR-2B-2BXI9P5zbvVuxMdWkFA2kHjw8I-3DGet hashmaliciousBrowse
      • 185.88.212.176
      http://particulares-personas.casacam.netGet hashmaliciousBrowse
      • 86.106.131.146
      1.12.2018.jsGet hashmaliciousBrowse
      • 62.113.241.182
      LAZZARO - DICHIARAZIONE NUOVO DI FABBRICA FT.610.vbsGet hashmaliciousBrowse
      • 185.212.44.165
      2018-12-10-Dridex-retrieved-by-Ursnif-infected-host.exeGet hashmaliciousBrowse
      • 185.158.251.55
      430#U0437.jsGet hashmaliciousBrowse
      • 86.105.5.133
      dropper.vbsGet hashmaliciousBrowse
      • 185.212.47.162
      24Faktura-2018_10_03_PDF.exeGet hashmaliciousBrowse
      • 86.105.5.133
      ttcv.exeGet hashmaliciousBrowse
      • 62.113.206.33
      968.exeGet hashmaliciousBrowse
      • 185.212.44.188
      bDFXsuH7Y.exeGet hashmaliciousBrowse
      • 185.212.44.197
      http://demo2.aurorapro.co/Download/US_us/Invoice-for-you&amp;data=02|01||447072d204914f25042208d6077443fb|1a407a2d76754d178692b3ac285306e4|0|0|636704593269411757&amp;sdata=1bJ9B7e/nHSkZxTPSrTtNw1nYhl4ZkhcBHYLd4Noe44=&amp;reserved=0Get hashmaliciousBrowse
      • 62.113.194.2
      Magnoliaenergyservices_Inquiry.docGet hashmaliciousBrowse
      • 185.212.44.114
      Magnoliaenergyservices_Inquiry.docGet hashmaliciousBrowse
      • 185.212.44.114
      Don_Callahan_Statement.docGet hashmaliciousBrowse
      • 185.212.44.114
      dana.exeGet hashmaliciousBrowse
      • 185.212.44.188
      Request.docGet hashmaliciousBrowse
      • 185.212.44.192
      Request.docGet hashmaliciousBrowse
      • 185.212.44.192
      uJmHzSRAKV.exeGet hashmaliciousBrowse
      • 185.212.44.119

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DES_ Holdings Ltd - products listing.exe.log
      Process:C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe
      File Type:ASCII text, with CRLF line terminators
      Category:modified
      Size (bytes):1314
      Entropy (8bit):5.350128552078965
      Encrypted:false
      SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
      MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
      SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
      SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
      SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
      Malicious:true
      Reputation:high, very likely benign file
      Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
      C:\Users\user\AppData\Local\Temp\tmp6AF5.tmp
      Process:C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):1656
      Entropy (8bit):5.175129653745441
      Encrypted:false
      SSDEEP:24:2dH4+SEqC/S7h2ulNMFp2O/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKB3qtn:cbha7JlNQV/rydbz9I3YODOLNdq3+
      MD5:2343A6BED4AF82751C5DABD255D343BB
      SHA1:1E2B29C6255066D17813A6E3032B67B18E46FB9F
      SHA-256:0601644D40CFC95D3A6FEBAB2DA30F0AE45CFECF73828420223773C4D6702BC2
      SHA-512:C4F9637CF2A077141136BDEBF480ECB8BB5BC8DE471C63162CDE02142A5B9F219C7B0FF74B3BED2FD213571F6838BFCB1092778288886FA38B4895BE5A72F71B
      Malicious:true
      Reputation:low
      Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvail
      C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Process:C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe
      File Type:data
      Category:dropped
      Size (bytes):8
      Entropy (8bit):3.0
      Encrypted:false
      SSDEEP:3:igf:igf
      MD5:C674AF0A62ED64247AA7136E386FCF6A
      SHA1:B7079B1F28C275BF6592F6CF07B1535674A07522
      SHA-256:B9BF7B9EB37AD9F36192E313FF923E292F5DAA060E9172F119D750412AC31953
      SHA-512:E64D9D55D93D2B6946BD828B5326BF31CA9CDA6547C3E87082260C59B204DD89B2CC02D87FE2981529B30C493470E3F2EBB51EF6B269FF1EE1A611495782039E
      Malicious:true
      Reputation:low
      Preview: ......H
      C:\Users\user\AppData\Roaming\gkzqjVdPrQY.exe
      Process:C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe
      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
      Category:dropped
      Size (bytes):881664
      Entropy (8bit):7.499349738651075
      Encrypted:false
      SSDEEP:12288:LbyzeHgTNEHcwslbwKkO55cmc9c5ELpqim5cYCgLtJ79ME:kWHc5wS5cb9maqim5Vp
      MD5:A07C438611C59FAD6083FAF789D40917
      SHA1:4BD9FCD0D981C75A4C875B0CA0F995957FD94BF9
      SHA-256:7BFE37FE1A33AFD35833F4085FED761A854DD617DF861A10FB7AD4E25D0F78A9
      SHA-512:1B3469E5ACA7982964ECF6A832AE431D57C231DB82F442F0FE0262672CC5FAD89E0CB466A890E35FA051A4F1683ECB50FBBF5A0ADF352E4114AC40B52074ECA2
      Malicious:true
      Antivirus:
      • Antivirus: Joe Sandbox ML, Detection: 100%
      • Antivirus: Virustotal, Detection: 27%, Browse
      • Antivirus: ReversingLabs, Detection: 24%
      Reputation:low
      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...c.._..............P..h..........F.... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...Lf... ...h.................. ..`.rsrc................j..............@..@.reloc...............r..............@..B................(.......H.......<...H...............p............................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....o....(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0..<........~.....(1.....,!r...p.....(2...o3...s4............~.....+..*.0......
      C:\Users\user\AppData\Roaming\gkzqjVdPrQY.exe:Zone.Identifier
      Process:C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):26
      Entropy (8bit):3.95006375643621
      Encrypted:false
      SSDEEP:3:ggPYV:rPYV
      MD5:187F488E27DB4AF347237FE461A079AD
      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
      Malicious:true
      Reputation:high, very likely benign file
      Preview: [ZoneTransfer]....ZoneId=0

      Static File Info

      General

      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):7.499349738651075
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
      • Win32 Executable (generic) a (10002005/4) 49.75%
      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
      • Windows Screen Saver (13104/52) 0.07%
      • Generic Win/DOS Executable (2004/3) 0.01%
      File name:DES_ Holdings Ltd - products listing.exe
      File size:881664
      MD5:a07c438611c59fad6083faf789d40917
      SHA1:4bd9fcd0d981c75a4c875b0ca0f995957fd94bf9
      SHA256:7bfe37fe1a33afd35833f4085fed761a854dd617df861a10fb7ad4e25d0f78a9
      SHA512:1b3469e5aca7982964ecf6a832ae431d57c231db82f442f0fe0262672cc5fad89e0cb466a890e35fa051a4f1683ecb50fbbf5a0adf352e4114ac40b52074eca2
      SSDEEP:12288:LbyzeHgTNEHcwslbwKkO55cmc9c5ELpqim5cYCgLtJ79ME:kWHc5wS5cb9maqim5Vp
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...c.._..............P..h..........F.... ........@.. ....................................@................................

      File Icon

      Icon Hash:00828e8e8686b000

      Static PE Info

      General

      Entrypoint:0x4d8646
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Time Stamp:0x5FF58363 [Wed Jan 6 09:31:15 2021 UTC]
      TLS Callbacks:
      CLR (.Net) Version:v4.0.30319
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

      Entrypoint Preview

      Instruction
      jmp dword ptr [00402000h]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al

      Data Directories

      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0xd85f40x4f.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0xda0000x608.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0xdc0000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

      Sections

      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x20000xd664c0xd6800False0.719495510999data7.50814730642IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .rsrc0xda0000x6080x800False0.3359375data3.47053367479IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0xdc0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

      Resources

      NameRVASizeTypeLanguageCountry
      RT_VERSION0xda0900x376data
      RT_MANIFEST0xda4180x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

      Imports

      DLLImport
      mscoree.dll_CorExeMain

      Version Infos

      DescriptionData
      Translation0x0000 0x04b0
      LegalCopyrightSaga 2019 (C)
      Assembly Version4.0.31.4
      InternalNameIServerResponseChannelSinkStack.exe
      FileVersion4.0.31.4
      CompanyName
      LegalTrademarks
      Comments
      ProductNamePANCHAYAT
      ProductVersion4.0.31.4
      FileDescriptionPANCHAYAT
      OriginalFilenameIServerResponseChannelSinkStack.exe

      Network Behavior

      Network Port Distribution

      TCP Packets

      TimestampSource PortDest PortSource IPDest IP
      Jan 6, 2021 17:50:36.790287971 CET497334021192.168.2.6212.83.46.26
      Jan 6, 2021 17:50:36.830689907 CET402149733212.83.46.26192.168.2.6
      Jan 6, 2021 17:50:37.369488001 CET497334021192.168.2.6212.83.46.26
      Jan 6, 2021 17:50:37.410010099 CET402149733212.83.46.26192.168.2.6
      Jan 6, 2021 17:50:38.072530031 CET497334021192.168.2.6212.83.46.26
      Jan 6, 2021 17:50:38.114321947 CET402149733212.83.46.26192.168.2.6
      Jan 6, 2021 17:50:42.223431110 CET497344021192.168.2.6212.83.46.26
      Jan 6, 2021 17:50:42.264889002 CET402149734212.83.46.26192.168.2.6
      Jan 6, 2021 17:50:42.901062012 CET497344021192.168.2.6212.83.46.26
      Jan 6, 2021 17:50:42.941751003 CET402149734212.83.46.26192.168.2.6
      Jan 6, 2021 17:50:43.538429976 CET497344021192.168.2.6212.83.46.26
      Jan 6, 2021 17:50:43.579083920 CET402149734212.83.46.26192.168.2.6
      Jan 6, 2021 17:50:47.611926079 CET497354021192.168.2.6212.83.46.26
      Jan 6, 2021 17:50:47.653609991 CET402149735212.83.46.26192.168.2.6
      Jan 6, 2021 17:50:48.163460016 CET497354021192.168.2.6212.83.46.26
      Jan 6, 2021 17:50:48.204055071 CET402149735212.83.46.26192.168.2.6
      Jan 6, 2021 17:50:48.714063883 CET497354021192.168.2.6212.83.46.26
      Jan 6, 2021 17:50:48.754411936 CET402149735212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:07.983830929 CET497574021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:08.024287939 CET402149757212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:08.528202057 CET497574021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:08.568825006 CET402149757212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:09.075181961 CET497574021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:09.115608931 CET402149757212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:13.124248981 CET497584021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:13.164758921 CET402149758212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:13.669209957 CET497584021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:13.709644079 CET402149758212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:14.216114998 CET497584021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:14.256788015 CET402149758212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:18.265567064 CET497594021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:18.306233883 CET402149759212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:18.810429096 CET497594021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:18.850975990 CET402149759212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:19.357319117 CET497594021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:19.397742033 CET402149759212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:38.516479015 CET497674021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:38.556870937 CET402149767212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:39.062050104 CET497674021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:39.102595091 CET402149767212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:39.609013081 CET497674021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:39.650106907 CET402149767212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:43.657633066 CET497684021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:43.698148012 CET402149768212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:44.204941988 CET497684021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:44.245661020 CET402149768212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:44.749962091 CET497684021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:44.790910959 CET402149768212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:48.829278946 CET497694021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:48.870187998 CET402149769212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:49.383923054 CET497694021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:49.425265074 CET402149769212.83.46.26192.168.2.6
      Jan 6, 2021 17:51:49.952919960 CET497694021192.168.2.6212.83.46.26
      Jan 6, 2021 17:51:49.993623972 CET402149769212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:10.080310106 CET497734021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:10.120717049 CET402149773212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:10.632829905 CET497734021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:10.673677921 CET402149773212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:11.179799080 CET497734021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:11.220446110 CET402149773212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:15.239511013 CET497744021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:15.280605078 CET402149774212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:15.789509058 CET497744021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:15.830097914 CET402149774212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:16.336435080 CET497744021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:16.376914024 CET402149774212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:20.385176897 CET497754021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:20.425801992 CET402149775212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:20.930555105 CET497754021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:20.971381903 CET402149775212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:21.477475882 CET497754021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:21.517916918 CET402149775212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:41.205782890 CET497794021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:41.246254921 CET402149779212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:41.760438919 CET497794021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:41.801101923 CET402149779212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:42.307327032 CET497794021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:42.348407984 CET402149779212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:46.358737946 CET497804021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:46.399880886 CET402149780212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:46.901499033 CET497804021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:46.942213058 CET402149780212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:47.448411942 CET497804021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:47.489322901 CET402149780212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:51.903670073 CET497814021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:51.944180012 CET402149781212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:52.448950052 CET497814021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:52.489999056 CET402149781212.83.46.26192.168.2.6
      Jan 6, 2021 17:52:52.995702028 CET497814021192.168.2.6212.83.46.26
      Jan 6, 2021 17:52:53.037700891 CET402149781212.83.46.26192.168.2.6

      Code Manipulations

      Statistics

      Behavior

      Click to jump to process

      System Behavior

      General

      Start time:17:50:05
      Start date:06/01/2021
      Path:C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe
      Wow64 process (32bit):true
      Commandline:'C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe'
      Imagebase:0x6c0000
      File size:881664 bytes
      MD5 hash:A07C438611C59FAD6083FAF789D40917
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:.Net C# or VB.NET
      Reputation:low

      General

      Start time:17:50:31
      Start date:06/01/2021
      Path:C:\Windows\SysWOW64\schtasks.exe
      Wow64 process (32bit):true
      Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\gkzqjVdPrQY' /XML 'C:\Users\user\AppData\Local\Temp\tmp6AF5.tmp'
      Imagebase:0xd10000
      File size:185856 bytes
      MD5 hash:15FF7D8324231381BAD48A052F85DF04
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:17:50:32
      Start date:06/01/2021
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff61de10000
      File size:625664 bytes
      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high

      General

      Start time:17:50:32
      Start date:06/01/2021
      Path:C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe
      Wow64 process (32bit):true
      Commandline:C:\Users\user\Desktop\DES_ Holdings Ltd - products listing.exe
      Imagebase:0xc90000
      File size:881664 bytes
      MD5 hash:A07C438611C59FAD6083FAF789D40917
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:.Net C# or VB.NET
      Yara matches:
      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.706915197.00000000058D0000.00000004.00000001.sdmp, Author: Florian Roth
      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.706915197.00000000058D0000.00000004.00000001.sdmp, Author: Florian Roth
      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.700133905.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.700133905.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
      • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.700133905.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.707188202.00000000062C0000.00000004.00000001.sdmp, Author: Florian Roth
      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000007.00000002.707188202.00000000062C0000.00000004.00000001.sdmp, Author: Florian Roth
      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.707188202.00000000062C0000.00000004.00000001.sdmp, Author: Joe Security
      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.705609344.0000000004139000.00000004.00000001.sdmp, Author: Joe Security
      • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.705609344.0000000004139000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
      Reputation:low

      Disassembly

      Code Analysis

      Reset < >