Loading ...

Play interactive tourEdit tour

Analysis Report Purchase Order #(PO-4147074).exe

Overview

General Information

Sample Name:Purchase Order #(PO-4147074).exe
Analysis ID:337361
MD5:b3ddd600d5608af2f0e334d71fff40ed
SHA1:d3985f7660b23bb7837ab58a464259e73b15feef
SHA256:9947c185b51b600edf4ad76e442cfbdf8a7621140c5197001844891312b69146
Tags:NanoCore

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM_3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • Purchase Order #(PO-4147074).exe (PID: 5284 cmdline: 'C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe' MD5: B3DDD600D5608AF2F0E334D71FFF40ED)
    • schtasks.exe (PID: 6004 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\FTbYDVOHFNt' /XML 'C:\Users\user\AppData\Local\Temp\tmp8E62.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 4788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"C2: ": ["212.83.46.26:4021", "212.83.46.26", "127.0.0.1:4021"], "Version: ": "NanoCore Client, Version=1.2.2.0"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000002.589318346.0000000005310000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xf7ad:$x1: NanoCore.ClientPluginHost
  • 0xf7da:$x2: IClientNetworkHost
00000003.00000002.589318346.0000000005310000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
  • 0xf7ad:$x2: NanoCore.ClientPluginHost
  • 0x10888:$s4: PipeCreated
  • 0xf7c7:$s5: IClientLoggingHost
00000003.00000002.589318346.0000000005310000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000003.00000002.589286551.0000000005300000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xe75:$x1: NanoCore.ClientPluginHost
    • 0xe8f:$x2: IClientNetworkHost
    00000003.00000002.589286551.0000000005300000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xe75:$x2: NanoCore.ClientPluginHost
    • 0x1261:$s3: PipeExists
    • 0x1136:$s4: PipeCreated
    • 0xeb0:$s5: IClientLoggingHost
    Click to see the 17 entries

    Unpacked PEs

    SourceRuleDescriptionAuthorStrings
    3.2.Purchase Order #(PO-4147074).exe.5310000.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xf7ad:$x1: NanoCore.ClientPluginHost
    • 0xf7da:$x2: IClientNetworkHost
    3.2.Purchase Order #(PO-4147074).exe.5310000.4.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xf7ad:$x2: NanoCore.ClientPluginHost
    • 0x10888:$s4: PipeCreated
    • 0xf7c7:$s5: IClientLoggingHost
    3.2.Purchase Order #(PO-4147074).exe.5310000.4.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      3.2.Purchase Order #(PO-4147074).exe.5300000.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      3.2.Purchase Order #(PO-4147074).exe.5300000.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      Click to see the 7 entries

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe, ProcessId: 1536, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Sigma detected: Scheduled temp file as task from temp locationShow sources
      Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\FTbYDVOHFNt' /XML 'C:\Users\user\AppData\Local\Temp\tmp8E62.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\FTbYDVOHFNt' /XML 'C:\Users\user\AppData\Local\Temp\tmp8E62.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe' , ParentImage: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe, ParentProcessId: 5284, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\FTbYDVOHFNt' /XML 'C:\Users\user\AppData\Local\Temp\tmp8E62.tmp', ProcessId: 6004

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: Purchase Order #(PO-4147074).exe.1536.3.memstrMalware Configuration Extractor: NanoCore {"C2: ": ["212.83.46.26:4021", "212.83.46.26", "127.0.0.1:4021"], "Version: ": "NanoCore Client, Version=1.2.2.0"}
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000003.00000002.589318346.0000000005310000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.580963895.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.583672189.0000000002A41000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.588220377.0000000003A89000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.231081613.0000000003929000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Purchase Order #(PO-4147074).exe PID: 1536, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Purchase Order #(PO-4147074).exe PID: 5284, type: MEMORY
      Source: Yara matchFile source: 3.2.Purchase Order #(PO-4147074).exe.5310000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.Purchase Order #(PO-4147074).exe.5310000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.Purchase Order #(PO-4147074).exe.400000.0.unpack, type: UNPACKEDPE
      Machine Learning detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\FTbYDVOHFNt.exeJoe Sandbox ML: detected
      Machine Learning detection for sampleShow sources
      Source: Purchase Order #(PO-4147074).exeJoe Sandbox ML: detected
      Source: 3.2.Purchase Order #(PO-4147074).exe.5310000.4.unpackAvira: Label: TR/NanoCore.fadte
      Source: 3.2.Purchase Order #(PO-4147074).exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
      Source: Purchase Order #(PO-4147074).exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: Purchase Order #(PO-4147074).exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeCode function: 4x nop then jmp 05E92236h

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorIPs: 212.83.46.26:4021
      Source: Malware configuration extractorIPs: 212.83.46.26
      Source: Malware configuration extractorIPs: 127.0.0.1:4021
      Source: global trafficTCP traffic: 192.168.2.3:49723 -> 212.83.46.26:4021
      Source: Joe Sandbox ViewASN Name: TTMDE TTMDE
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: unknownTCP traffic detected without corresponding DNS query: 212.83.46.26
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000002.230037064.0000000002901000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000002.229892856.0000000000DCB000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.588220377.0000000003A89000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000003.00000002.589318346.0000000005310000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.580963895.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.583672189.0000000002A41000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.588220377.0000000003A89000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.231081613.0000000003929000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Purchase Order #(PO-4147074).exe PID: 1536, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Purchase Order #(PO-4147074).exe PID: 5284, type: MEMORY
      Source: Yara matchFile source: 3.2.Purchase Order #(PO-4147074).exe.5310000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.Purchase Order #(PO-4147074).exe.5310000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.Purchase Order #(PO-4147074).exe.400000.0.unpack, type: UNPACKEDPE

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000003.00000002.589318346.0000000005310000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000003.00000002.589286551.0000000005300000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000003.00000002.580963895.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000003.00000002.580963895.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000003.00000002.588220377.0000000003A89000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.231081613.0000000003929000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.231081613.0000000003929000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: Purchase Order #(PO-4147074).exe PID: 1536, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: Purchase Order #(PO-4147074).exe PID: 1536, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: Purchase Order #(PO-4147074).exe PID: 5284, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: Purchase Order #(PO-4147074).exe PID: 5284, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 3.2.Purchase Order #(PO-4147074).exe.5310000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 3.2.Purchase Order #(PO-4147074).exe.5300000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 3.2.Purchase Order #(PO-4147074).exe.5310000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 3.2.Purchase Order #(PO-4147074).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 3.2.Purchase Order #(PO-4147074).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Initial sample is a PE file and has a suspicious nameShow sources
      Source: initial sampleStatic PE information: Filename: Purchase Order #(PO-4147074).exe
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeCode function: 3_2_00F8E480
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeCode function: 3_2_00F8E471
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeCode function: 3_2_00F8BBD4
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000002.239810218.00000000064C0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs Purchase Order #(PO-4147074).exe
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000002.239810218.00000000064C0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs Purchase Order #(PO-4147074).exe
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000002.239553221.0000000005CA0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamePositiveSign.dll< vs Purchase Order #(PO-4147074).exe
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000002.229892856.0000000000DCB000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Purchase Order #(PO-4147074).exe
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000002.230037064.0000000002901000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSoapName.dll2 vs Purchase Order #(PO-4147074).exe
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000002.229611492.0000000000678000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameEventProviderWriter.exeZ vs Purchase Order #(PO-4147074).exe
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000002.239684106.00000000063C0000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs Purchase Order #(PO-4147074).exe
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.591922712.00000000063B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs Purchase Order #(PO-4147074).exe
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.581627878.00000000006B8000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameEventProviderWriter.exeZ vs Purchase Order #(PO-4147074).exe
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.583672189.0000000002A41000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Purchase Order #(PO-4147074).exe
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.591844560.0000000005E80000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Purchase Order #(PO-4147074).exe
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.590522113.0000000005B50000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Purchase Order #(PO-4147074).exe
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.588220377.0000000003A89000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Purchase Order #(PO-4147074).exe
      Source: Purchase Order #(PO-4147074).exeBinary or memory string: OriginalFilenameEventProviderWriter.exeZ vs Purchase Order #(PO-4147074).exe
      Source: Purchase Order #(PO-4147074).exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 00000003.00000002.589318346.0000000005310000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000003.00000002.589318346.0000000005310000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000003.00000002.589286551.0000000005300000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000003.00000002.589286551.0000000005300000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 00000003.00000002.580963895.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000003.00000002.580963895.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000003.00000002.588220377.0000000003A89000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.231081613.0000000003929000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.231081613.0000000003929000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: Purchase Order #(PO-4147074).exe PID: 1536, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: Purchase Order #(PO-4147074).exe PID: 1536, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: Purchase Order #(PO-4147074).exe PID: 5284, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: Purchase Order #(PO-4147074).exe PID: 5284, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 3.2.Purchase Order #(PO-4147074).exe.5310000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 3.2.Purchase Order #(PO-4147074).exe.5310000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 3.2.Purchase Order #(PO-4147074).exe.5300000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 3.2.Purchase Order #(PO-4147074).exe.5300000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 3.2.Purchase Order #(PO-4147074).exe.5310000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 3.2.Purchase Order #(PO-4147074).exe.5310000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 3.2.Purchase Order #(PO-4147074).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 3.2.Purchase Order #(PO-4147074).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
      Source: 3.2.Purchase Order #(PO-4147074).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Purchase Order #(PO-4147074).exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: FTbYDVOHFNt.exe.0.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: 3.2.Purchase Order #(PO-4147074).exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 3.2.Purchase Order #(PO-4147074).exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
      Source: 3.2.Purchase Order #(PO-4147074).exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
      Source: classification engineClassification label: mal100.troj.evad.winEXE@6/5@0/4
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeFile created: C:\Users\user\AppData\Roaming\FTbYDVOHFNt.exeJump to behavior
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeMutant created: \Sessions\1\BaseNamedObjects\kTGjqdiOHfstXxugVi
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeMutant created: \Sessions\1\BaseNamedObjects\Global\{3b0a05ab-e8be-49ea-960f-63681280e339}
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4788:120:WilError_01
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeFile created: C:\Users\user\AppData\Local\Temp\tmp8E62.tmpJump to behavior
      Source: Purchase Order #(PO-4147074).exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000000.201664009.00000000005B2000.00000002.00020000.sdmp, Purchase Order #(PO-4147074).exe, 00000003.00000000.228729264.00000000005F2000.00000002.00020000.sdmpBinary or memory string: SELECT BILLNO, CUSTOMERNAME, HOSPITAL_NAME, BLOOD_GROUP, PURCHASE_DATE, NO_OF_PACKET, PRICE FROM CUSTOMER WHERE BILLNO={0}<tr>K<td><b>Bill No.: </b>&nbsp;&nbsp;<tt>
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeFile read: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe 'C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe'
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\FTbYDVOHFNt' /XML 'C:\Users\user\AppData\Local\Temp\tmp8E62.tmp'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\FTbYDVOHFNt' /XML 'C:\Users\user\AppData\Local\Temp\tmp8E62.tmp'
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess created: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: Purchase Order #(PO-4147074).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: Purchase Order #(PO-4147074).exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

      Data Obfuscation:

      barindex
      .NET source code contains potential unpackerShow sources
      Source: 3.2.Purchase Order #(PO-4147074).exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: 3.2.Purchase Order #(PO-4147074).exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeCode function: 0_2_05E94C95 push FFFFFF8Bh; iretd
      Source: initial sampleStatic PE information: section name: .text entropy: 7.78209030253
      Source: initial sampleStatic PE information: section name: .text entropy: 7.78209030253
      Source: 3.2.Purchase Order #(PO-4147074).exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
      Source: 3.2.Purchase Order #(PO-4147074).exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeFile created: C:\Users\user\AppData\Roaming\FTbYDVOHFNt.exeJump to dropped file

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\FTbYDVOHFNt' /XML 'C:\Users\user\AppData\Local\Temp\tmp8E62.tmp'

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeFile opened: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Yara detected AntiVM_3Show sources
      Source: Yara matchFile source: 00000000.00000002.230037064.0000000002901000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Purchase Order #(PO-4147074).exe PID: 5284, type: MEMORY
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000002.230037064.0000000002901000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000002.230037064.0000000002901000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeWindow / User API: threadDelayed 4875
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeWindow / User API: threadDelayed 4773
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeWindow / User API: foregroundWindowGot 1367
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeWindow / User API: foregroundWindowGot 455
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe TID: 4088Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe TID: 5280Thread sleep time: -52947s >= -30000s
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe TID: 2992Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe TID: 6096Thread sleep time: -17524406870024063s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000002.230037064.0000000002901000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.591922712.00000000063B0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000002.230037064.0000000002901000.00000004.00000001.sdmpBinary or memory string: vmware
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.591922712.00000000063B0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.591922712.00000000063B0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000002.230037064.0000000002901000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000002.229916054.0000000000DFF000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000002.230037064.0000000002901000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.591922712.00000000063B0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeMemory allocated: page read and write | page guard
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\FTbYDVOHFNt' /XML 'C:\Users\user\AppData\Local\Temp\tmp8E62.tmp'
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeProcess created: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.586825345.0000000002DD3000.00000004.00000001.sdmpBinary or memory string: Program Manager
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.583454477.0000000001530000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.583454477.0000000001530000.00000002.00000001.sdmpBinary or memory string: Progman
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.591089615.0000000005CFF000.00000004.00000001.sdmpBinary or memory string: Program Managerp
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.586825345.0000000002DD3000.00000004.00000001.sdmpBinary or memory string: Program Manager|$
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.590465959.0000000005B4B000.00000004.00000001.sdmpBinary or memory string: Program Managerp8
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.591915457.00000000063AE000.00000004.00000001.sdmpBinary or memory string: Program ManagerpX
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.583454477.0000000001530000.00000002.00000001.sdmpBinary or memory string: Progmanlock
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeQueries volume information: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe VolumeInformation
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformation
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeQueries volume information: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe VolumeInformation
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Users\user\Desktop\Purchase Order #(PO-4147074).exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000003.00000002.589318346.0000000005310000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.580963895.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.583672189.0000000002A41000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.588220377.0000000003A89000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.231081613.0000000003929000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Purchase Order #(PO-4147074).exe PID: 1536, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Purchase Order #(PO-4147074).exe PID: 5284, type: MEMORY
      Source: Yara matchFile source: 3.2.Purchase Order #(PO-4147074).exe.5310000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.Purchase Order #(PO-4147074).exe.5310000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.Purchase Order #(PO-4147074).exe.400000.0.unpack, type: UNPACKEDPE

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: Purchase Order #(PO-4147074).exe, 00000000.00000002.231081613.0000000003929000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.580963895.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: Purchase Order #(PO-4147074).exe, 00000003.00000002.583672189.0000000002A41000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000003.00000002.589318346.0000000005310000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.580963895.0000000000402000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.583672189.0000000002A41000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000003.00000002.588220377.0000000003A89000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.231081613.0000000003929000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Purchase Order #(PO-4147074).exe PID: 1536, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Purchase Order #(PO-4147074).exe PID: 5284, type: MEMORY
      Source: Yara matchFile source: 3.2.Purchase Order #(PO-4147074).exe.5310000.4.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.Purchase Order #(PO-4147074).exe.5310000.4.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 3.2.Purchase Order #(PO-4147074).exe.400000.0.unpack, type: UNPACKEDPE

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection12Masquerading1Input Capture21Security Software Discovery111Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Virtualization/Sandbox Evasion3LSASS MemoryVirtualization/Sandbox Evasion3Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information3DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      Purchase Order #(PO-4147074).exe9%ReversingLabsWin32.Trojan.Wacatac
      Purchase Order #(PO-4147074).exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\FTbYDVOHFNt.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Roaming\FTbYDVOHFNt.exe9%ReversingLabsWin32.Trojan.Wacatac

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      3.2.Purchase Order #(PO-4147074).exe.5310000.4.unpack100%AviraTR/NanoCore.fadteDownload File
      3.2.Purchase Order #(PO-4147074).exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

      Domains

      No Antivirus matches

      URLs

      No Antivirus matches

      Domains and IPs

      Contacted Domains

      No contacted domains info

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePurchase Order #(PO-4147074).exe, 00000000.00000002.230037064.0000000002901000.00000004.00000001.sdmpfalse
        high

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        212.83.46.26:4021
        unknownunknown
        unknownunknowntrue
        212.83.46.26
        unknownGermany
        47447TTMDEtrue

        Private

        IP
        127.0.0.1:4021
        127.0.0.1

        General Information

        Joe Sandbox Version:31.0.0 Red Diamond
        Analysis ID:337361
        Start date:08.01.2021
        Start time:13:33:18
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 7m 0s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:Purchase Order #(PO-4147074).exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:34
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@6/5@0/4
        EGA Information:Failed
        HDC Information:
        • Successful, ratio: 1.1% (good quality ratio 0.6%)
        • Quality average: 35.9%
        • Quality standard deviation: 37.7%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        Warnings:
        Show All
        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
        • TCP Packets have been reduced to 100
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        13:34:11API Interceptor1410x Sleep call for process: Purchase Order #(PO-4147074).exe modified

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        212.83.46.26BID_TENDER_DOCUMENTS-#01.08.2020.exeGet hashmaliciousBrowse
          DES_ Holdings Ltd - products listing.exeGet hashmaliciousBrowse
            DES_ Holdings Ltd - products listing.exeGet hashmaliciousBrowse

              Domains

              No context

              ASN

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              TTMDEBID_TENDER_DOCUMENTS-#01.08.2020.exeGet hashmaliciousBrowse
              • 212.83.46.26
              DES_ Holdings Ltd - products listing.exeGet hashmaliciousBrowse
              • 212.83.46.26
              DES_ Holdings Ltd - products listing.exeGet hashmaliciousBrowse
              • 212.83.46.26
              https://wearemondaymorning.com/?email=alabdullaah@qcb.gov.qaGet hashmaliciousBrowse
              • 91.216.248.23
              https://u5827342.ct.sendgrid.net/ls/click?upn=ZYh6DIqA4xFmr84ZswpQ4c7ONXu2767hYXZwjBnWOY1JkdxAPQD-2Fy87STH2Xf5tCCv1Cfr7SK5QugA1gtf5hkg-3D-3Dr4Nw_DjWowFHgGKgaKR9KzEYTR3nC3p1AWGbaYDP6e93ZAEhNXUTlygFT7vEfeXJ-2FNinzoSEU8wjkiLZ-2Bj7exG0PiN7C92INCv5B1zQa4g83-2Ba0GFHBdwZkJ1voppTs162kZzXHlYGblxkHafYbaoPEnOE3v4nRdYqpT6uzb2BlJNElCCZ2m51yxYwgCwRvlrdJPPvzbuawtl4F-2B3DK6fR-2B-2BXI9P5zbvVuxMdWkFA2kHjw8I-3DGet hashmaliciousBrowse
              • 185.88.212.176
              http://particulares-personas.casacam.netGet hashmaliciousBrowse
              • 86.106.131.146
              1.12.2018.jsGet hashmaliciousBrowse
              • 62.113.241.182
              LAZZARO - DICHIARAZIONE NUOVO DI FABBRICA FT.610.vbsGet hashmaliciousBrowse
              • 185.212.44.165
              2018-12-10-Dridex-retrieved-by-Ursnif-infected-host.exeGet hashmaliciousBrowse
              • 185.158.251.55
              430#U0437.jsGet hashmaliciousBrowse
              • 86.105.5.133
              dropper.vbsGet hashmaliciousBrowse
              • 185.212.47.162
              24Faktura-2018_10_03_PDF.exeGet hashmaliciousBrowse
              • 86.105.5.133
              ttcv.exeGet hashmaliciousBrowse
              • 62.113.206.33
              968.exeGet hashmaliciousBrowse
              • 185.212.44.188
              bDFXsuH7Y.exeGet hashmaliciousBrowse
              • 185.212.44.197
              http://demo2.aurorapro.co/Download/US_us/Invoice-for-you&amp;data=02|01||447072d204914f25042208d6077443fb|1a407a2d76754d178692b3ac285306e4|0|0|636704593269411757&amp;sdata=1bJ9B7e/nHSkZxTPSrTtNw1nYhl4ZkhcBHYLd4Noe44=&amp;reserved=0Get hashmaliciousBrowse
              • 62.113.194.2
              Magnoliaenergyservices_Inquiry.docGet hashmaliciousBrowse
              • 185.212.44.114
              Magnoliaenergyservices_Inquiry.docGet hashmaliciousBrowse
              • 185.212.44.114
              Don_Callahan_Statement.docGet hashmaliciousBrowse
              • 185.212.44.114
              dana.exeGet hashmaliciousBrowse
              • 185.212.44.188

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Purchase Order #(PO-4147074).exe.log
              Process:C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):1314
              Entropy (8bit):5.350128552078965
              Encrypted:false
              SSDEEP:24:MLU84jE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4sAmEw:MgvjHK5HKXE1qHiYHKhQnoPtHoxHhAHR
              MD5:1DC1A2DCC9EFAA84EABF4F6D6066565B
              SHA1:B7FCF805B6DD8DE815EA9BC089BD99F1E617F4E9
              SHA-256:28D63442C17BF19558655C88A635CB3C3FF1BAD1CCD9784090B9749A7E71FCEF
              SHA-512:95DD7E2AB0884A3EFD9E26033B337D1F97DDF9A8E9E9C4C32187DCD40622D8B1AC8CCDBA12A70A6B9075DF5E7F68DF2F8FBA4AB33DB4576BE9806B8E191802B7
              Malicious:true
              Reputation:high, very likely benign file
              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
              C:\Users\user\AppData\Local\Temp\tmp8E62.tmp
              Process:C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1644
              Entropy (8bit):5.200006301377986
              Encrypted:false
              SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBJtn:cbh47TlNQ//rydbz9I3YODOLNdq3x
              MD5:5FEA5F6BFD0591063F9FAA786CFE42DD
              SHA1:6382962191BA25BB96996C00D53C206D89E6736C
              SHA-256:046F0EAB0D29A9E8C5F01572EA5A0E836ACDAC7D1280FFAD8BCC1B862C661EF6
              SHA-512:54C17D5E5AB25190A66413152423273C488BDEBBBE3707F2A7F6470F441807ED24F64805F2CE28ED63CAA2B05D1412F839C4928EEB909B79CD5ED74234BB0055
              Malicious:true
              Reputation:low
              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
              Process:C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe
              File Type:data
              Category:dropped
              Size (bytes):8
              Entropy (8bit):3.0
              Encrypted:false
              SSDEEP:3:h34bt:BMt
              MD5:0AA7F4336E6E620E6997248545A0DB28
              SHA1:226CE87FC2CB41F6E38956C273B4C998AB77C31E
              SHA-256:08EA1AA2EF6CF4183A2F68457783FC980C34B739EEA97A5379FC0EC2F39E81BA
              SHA-512:F80B21B012B92536C2A7CF62CD56B0DD1A513B4987EEE2CE91BACDE33A3553CE5B8D5B2583A19F97FD9ECC5EF86B13701CAFDF07B303298A69EA8B05D2977F24
              Malicious:true
              Reputation:low
              Preview: ...(...H
              C:\Users\user\AppData\Roaming\FTbYDVOHFNt.exe
              Process:C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):877056
              Entropy (8bit):7.72113097997091
              Encrypted:false
              SSDEEP:24576:8cElrlHDgNzAPdXl+ldqqGB5Jh0KJUWMoR1BL/:8cuJgNz6xGcxFh04UWMoR1
              MD5:B3DDD600D5608AF2F0E334D71FFF40ED
              SHA1:D3985F7660B23BB7837AB58A464259E73B15FEEF
              SHA-256:9947C185B51B600EDF4AD76E442CFBDF8A7621140C5197001844891312B69146
              SHA-512:C1F0160AD28398EDE7BEFE3DB778E9383DD159733C18EA8D40173191D8A7D805F7021B6C1BC85A8CAD45235439672E387FA773E3A2359BA4536EAAC676974557
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 9%
              Reputation:low
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...U.._..............P..N...........l... ........@.. ....................................@.................................\l..O.................................................................................... ............... ..H............text....L... ...N.................. ..`.rsrc................P..............@..@.reloc...............`..............@..B.................l......H.......<... ............'..h............................................0..#.......+.&...(....(..........(.....o.....*..................0..........+.&..8......8.....+:..Pa.+...Ua...TXE................R....Q(.....+......&...+......+...UYE................+...:...U...^...t...}..........+.+......&..8z......8r.....(.......8c.....(.......8T.....(....+.(....8>......89.......80.....(....+..8......8........8........8....*....0..........+.&...+...Ra.+...Qa8t.....OY+K..+.....+...PYE...
              C:\Users\user\AppData\Roaming\FTbYDVOHFNt.exe:Zone.Identifier
              Process:C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview: [ZoneTransfer]....ZoneId=0

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):7.72113097997091
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              • Win32 Executable (generic) a (10002005/4) 49.78%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Win16/32 Executable Delphi generic (2074/23) 0.01%
              • Generic Win/DOS Executable (2004/3) 0.01%
              File name:Purchase Order #(PO-4147074).exe
              File size:877056
              MD5:b3ddd600d5608af2f0e334d71fff40ed
              SHA1:d3985f7660b23bb7837ab58a464259e73b15feef
              SHA256:9947c185b51b600edf4ad76e442cfbdf8a7621140c5197001844891312b69146
              SHA512:c1f0160ad28398ede7befe3db778e9383dd159733c18ea8d40173191d8a7d805f7021b6c1bc85a8cad45235439672e387fa773e3a2359ba4536eaac676974557
              SSDEEP:24576:8cElrlHDgNzAPdXl+ldqqGB5Jh0KJUWMoR1BL/:8cuJgNz6xGcxFh04UWMoR1
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...U.._..............P..N...........l... ........@.. ....................................@................................

              File Icon

              Icon Hash:849494a4a4a4e464

              Static PE Info

              General

              Entrypoint:0x4c6cae
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x5FF81755 [Fri Jan 8 08:27:01 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:v4.0.30319
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

              Entrypoint Preview

              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xc6c5c0x4f.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x11000.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0xda0000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000xc4cb40xc4e00False0.851246279762data7.78209030253IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .rsrc0xc80000x110000x11000False0.10982019761data5.22269958854IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0xda0000xc0x200False0.044921875data0.0980041756627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_ICON0xc81300x10828data
              RT_GROUP_ICON0xd89580x14data
              RT_VERSION0xd896c0x430data
              RT_MANIFEST0xd8d9c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

              Imports

              DLLImport
              mscoree.dll_CorExeMain

              Version Infos

              DescriptionData
              Translation0x0000 0x04b0
              LegalCopyrightCopyright Arnav Mukhopadhyay 2011
              Assembly Version2.0.0.0
              InternalNameEventProviderWriter.exe
              FileVersion2.0.0.0
              CompanyNameArnav Mukhopadhay
              LegalTrademarksArnav Mukhopadhyay. All RRights Reversed
              CommentsBlood Bank Management System
              ProductNameBlood Band Management System
              ProductVersion2.0.0.0
              FileDescriptionBBMS
              OriginalFilenameEventProviderWriter.exe

              Network Behavior

              Network Port Distribution

              TCP Packets

              TimestampSource PortDest PortSource IPDest IP
              Jan 8, 2021 13:34:22.134083033 CET497234021192.168.2.3212.83.46.26
              Jan 8, 2021 13:34:22.174725056 CET402149723212.83.46.26192.168.2.3
              Jan 8, 2021 13:34:22.686614990 CET497234021192.168.2.3212.83.46.26
              Jan 8, 2021 13:34:22.727324963 CET402149723212.83.46.26192.168.2.3
              Jan 8, 2021 13:34:23.233599901 CET497234021192.168.2.3212.83.46.26
              Jan 8, 2021 13:34:23.274667025 CET402149723212.83.46.26192.168.2.3
              Jan 8, 2021 13:34:27.876353025 CET497244021192.168.2.3212.83.46.26
              Jan 8, 2021 13:34:27.916615009 CET402149724212.83.46.26192.168.2.3
              Jan 8, 2021 13:34:28.546427965 CET497244021192.168.2.3212.83.46.26
              Jan 8, 2021 13:34:28.586849928 CET402149724212.83.46.26192.168.2.3
              Jan 8, 2021 13:34:29.249695063 CET497244021192.168.2.3212.83.46.26
              Jan 8, 2021 13:34:29.290848017 CET402149724212.83.46.26192.168.2.3
              Jan 8, 2021 13:34:33.297965050 CET497284021192.168.2.3212.83.46.26
              Jan 8, 2021 13:34:33.338845015 CET402149728212.83.46.26192.168.2.3
              Jan 8, 2021 13:34:33.999962091 CET497284021192.168.2.3212.83.46.26
              Jan 8, 2021 13:34:34.040394068 CET402149728212.83.46.26192.168.2.3
              Jan 8, 2021 13:34:34.687545061 CET497284021192.168.2.3212.83.46.26
              Jan 8, 2021 13:34:34.732943058 CET402149728212.83.46.26192.168.2.3
              Jan 8, 2021 13:34:54.051487923 CET497384021192.168.2.3212.83.46.26
              Jan 8, 2021 13:34:54.094207048 CET402149738212.83.46.26192.168.2.3
              Jan 8, 2021 13:34:54.595576048 CET497384021192.168.2.3212.83.46.26
              Jan 8, 2021 13:34:54.637036085 CET402149738212.83.46.26192.168.2.3
              Jan 8, 2021 13:34:55.142472982 CET497384021192.168.2.3212.83.46.26
              Jan 8, 2021 13:34:55.183638096 CET402149738212.83.46.26192.168.2.3
              Jan 8, 2021 13:34:59.191298008 CET497394021192.168.2.3212.83.46.26
              Jan 8, 2021 13:34:59.232515097 CET402149739212.83.46.26192.168.2.3
              Jan 8, 2021 13:34:59.736577988 CET497394021192.168.2.3212.83.46.26
              Jan 8, 2021 13:34:59.777002096 CET402149739212.83.46.26192.168.2.3
              Jan 8, 2021 13:35:00.283488035 CET497394021192.168.2.3212.83.46.26
              Jan 8, 2021 13:35:00.324542999 CET402149739212.83.46.26192.168.2.3
              Jan 8, 2021 13:35:04.332012892 CET497404021192.168.2.3212.83.46.26
              Jan 8, 2021 13:35:04.372834921 CET402149740212.83.46.26192.168.2.3
              Jan 8, 2021 13:35:04.877577066 CET497404021192.168.2.3212.83.46.26
              Jan 8, 2021 13:35:04.917860031 CET402149740212.83.46.26192.168.2.3
              Jan 8, 2021 13:35:05.424664974 CET497404021192.168.2.3212.83.46.26
              Jan 8, 2021 13:35:05.465157986 CET402149740212.83.46.26192.168.2.3
              Jan 8, 2021 13:35:25.178369045 CET497524021192.168.2.3212.83.46.26
              Jan 8, 2021 13:35:25.218832970 CET402149752212.83.46.26192.168.2.3
              Jan 8, 2021 13:35:25.723053932 CET497524021192.168.2.3212.83.46.26
              Jan 8, 2021 13:35:25.763889074 CET402149752212.83.46.26192.168.2.3
              Jan 8, 2021 13:35:26.269974947 CET497524021192.168.2.3212.83.46.26
              Jan 8, 2021 13:35:26.310976982 CET402149752212.83.46.26192.168.2.3
              Jan 8, 2021 13:35:30.319906950 CET497534021192.168.2.3212.83.46.26
              Jan 8, 2021 13:35:30.361080885 CET402149753212.83.46.26192.168.2.3
              Jan 8, 2021 13:35:30.864172935 CET497534021192.168.2.3212.83.46.26
              Jan 8, 2021 13:35:30.906100035 CET402149753212.83.46.26192.168.2.3
              Jan 8, 2021 13:35:31.411005020 CET497534021192.168.2.3212.83.46.26
              Jan 8, 2021 13:35:31.451287985 CET402149753212.83.46.26192.168.2.3
              Jan 8, 2021 13:35:35.460705996 CET497544021192.168.2.3212.83.46.26
              Jan 8, 2021 13:35:35.501075029 CET402149754212.83.46.26192.168.2.3
              Jan 8, 2021 13:35:36.005657911 CET497544021192.168.2.3212.83.46.26
              Jan 8, 2021 13:35:36.046097040 CET402149754212.83.46.26192.168.2.3
              Jan 8, 2021 13:35:36.552158117 CET497544021192.168.2.3212.83.46.26
              Jan 8, 2021 13:35:36.593445063 CET402149754212.83.46.26192.168.2.3
              Jan 8, 2021 13:35:55.856411934 CET497604021192.168.2.3212.83.46.26
              Jan 8, 2021 13:35:55.896976948 CET402149760212.83.46.26192.168.2.3
              Jan 8, 2021 13:35:56.397687912 CET497604021192.168.2.3212.83.46.26
              Jan 8, 2021 13:35:56.439618111 CET402149760212.83.46.26192.168.2.3
              Jan 8, 2021 13:35:56.944469929 CET497604021192.168.2.3212.83.46.26
              Jan 8, 2021 13:35:56.985363960 CET402149760212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:00.993014097 CET497614021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:01.033864021 CET402149761212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:01.538611889 CET497614021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:01.579519987 CET402149761212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:02.085611105 CET497614021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:02.126224995 CET402149761212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:06.133513927 CET497624021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:06.174964905 CET402149762212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:06.679569960 CET497624021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:06.720120907 CET402149762212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:07.226649046 CET497624021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:07.267260075 CET402149762212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:26.450643063 CET497664021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:26.491488934 CET402149766212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:26.993753910 CET497664021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:27.034763098 CET402149766212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:27.540673971 CET497664021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:27.582026958 CET402149766212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:31.589564085 CET497674021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:31.629873037 CET402149767212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:32.134824991 CET497674021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:32.176363945 CET402149767212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:32.681740999 CET497674021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:32.722584963 CET402149767212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:36.730626106 CET497684021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:36.771327972 CET402149768212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:37.275928020 CET497684021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:37.318449020 CET402149768212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:37.822778940 CET497684021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:37.863481045 CET402149768212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:57.110183001 CET497744021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:57.150681019 CET402149774212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:57.694818020 CET497744021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:57.736248016 CET402149774212.83.46.26192.168.2.3
              Jan 8, 2021 13:36:58.296552896 CET497744021192.168.2.3212.83.46.26
              Jan 8, 2021 13:36:58.337467909 CET402149774212.83.46.26192.168.2.3
              Jan 8, 2021 13:37:02.345845938 CET497814021192.168.2.3212.83.46.26
              Jan 8, 2021 13:37:02.386921883 CET402149781212.83.46.26192.168.2.3
              Jan 8, 2021 13:37:02.891062975 CET497814021192.168.2.3212.83.46.26
              Jan 8, 2021 13:37:02.931544065 CET402149781212.83.46.26192.168.2.3

              Code Manipulations

              Statistics

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:13:34:05
              Start date:08/01/2021
              Path:C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe'
              Imagebase:0x5b0000
              File size:877056 bytes
              MD5 hash:B3DDD600D5608AF2F0E334D71FFF40ED
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.230037064.0000000002901000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.231081613.0000000003929000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.231081613.0000000003929000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.231081613.0000000003929000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low

              General

              Start time:13:34:17
              Start date:08/01/2021
              Path:C:\Windows\SysWOW64\schtasks.exe
              Wow64 process (32bit):true
              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\FTbYDVOHFNt' /XML 'C:\Users\user\AppData\Local\Temp\tmp8E62.tmp'
              Imagebase:0xa0000
              File size:185856 bytes
              MD5 hash:15FF7D8324231381BAD48A052F85DF04
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:13:34:18
              Start date:08/01/2021
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6b2800000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:13:34:18
              Start date:08/01/2021
              Path:C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\Purchase Order #(PO-4147074).exe
              Imagebase:0x5f0000
              File size:877056 bytes
              MD5 hash:B3DDD600D5608AF2F0E334D71FFF40ED
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.589318346.0000000005310000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.589318346.0000000005310000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.589318346.0000000005310000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.589286551.0000000005300000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000003.00000002.589286551.0000000005300000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.580963895.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.580963895.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.580963895.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.583672189.0000000002A41000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.588220377.0000000003A89000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.588220377.0000000003A89000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low

              Disassembly

              Code Analysis

              Reset < >