Loading ...

Play interactive tourEdit tour

Analysis Report Scan_00059010189_ ref. 004118379411_ pdf.exe

Overview

General Information

Sample Name:Scan_00059010189_ ref. 004118379411_ pdf.exe
Analysis ID:337758
MD5:106117a9928b774aa6bbb657f275de53
SHA1:208d61ecd30789fba2325a0e0f46bb63bdba5bd9
SHA256:a5affcfc364530db52dd4fcf252187cc09968a7bb1f1149bb919fd339634468a
Tags:exeNanoCoreRAT

Most interesting Screenshot:

Errors
  • Sigma syntax error: Has an empty selector, Rule: Abusing Azure Browser SSO

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected Nanocore Rat
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected Nanocore RAT
Allocates memory in foreign processes
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • Scan_00059010189_ ref. 004118379411_ pdf.exe (PID: 4532 cmdline: 'C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exe' MD5: 106117A9928B774AA6BBB657F275DE53)
    • RegAsm.exe (PID: 5764 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe MD5: 6FD7592411112729BF6B1F2F6C34899F)
      • schtasks.exe (PID: 4392 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE5CB.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 5436 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp606.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 3536 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • RegAsm.exe (PID: 6028 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 0 MD5: 6FD7592411112729BF6B1F2F6C34899F)
    • conhost.exe (PID: 4944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 4948 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 6FD7592411112729BF6B1F2F6C34899F)
    • conhost.exe (PID: 5352 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 5644 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 6FD7592411112729BF6B1F2F6C34899F)
    • conhost.exe (PID: 1624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.233831964.0000000003A04000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x442ed:$x1: NanoCore.ClientPluginHost
  • 0x76f1d:$x1: NanoCore.ClientPluginHost
  • 0xa993d:$x1: NanoCore.ClientPluginHost
  • 0x4432a:$x2: IClientNetworkHost
  • 0x76f5a:$x2: IClientNetworkHost
  • 0xa997a:$x2: IClientNetworkHost
  • 0x47e5d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0x7aa8d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0xad4ad:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000001.00000002.233831964.0000000003A04000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000001.00000002.233831964.0000000003A04000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x44055:$a: NanoCore
    • 0x44065:$a: NanoCore
    • 0x44299:$a: NanoCore
    • 0x442ad:$a: NanoCore
    • 0x442ed:$a: NanoCore
    • 0x76c85:$a: NanoCore
    • 0x76c95:$a: NanoCore
    • 0x76ec9:$a: NanoCore
    • 0x76edd:$a: NanoCore
    • 0x76f1d:$a: NanoCore
    • 0xa96a5:$a: NanoCore
    • 0xa96b5:$a: NanoCore
    • 0xa98e9:$a: NanoCore
    • 0xa98fd:$a: NanoCore
    • 0xa993d:$a: NanoCore
    • 0x440b4:$b: ClientPlugin
    • 0x442b6:$b: ClientPlugin
    • 0x442f6:$b: ClientPlugin
    • 0x76ce4:$b: ClientPlugin
    • 0x76ee6:$b: ClientPlugin
    • 0x76f26:$b: ClientPlugin
    Process Memory Space: Scan_00059010189_ ref. 004118379411_ pdf.exe PID: 4532Nanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xfb31:$x1: NanoCore.ClientPluginHost
    • 0x2e4b0:$x1: NanoCore.ClientPluginHost
    • 0x4cd44:$x1: NanoCore.ClientPluginHost
    • 0xfb92:$x2: IClientNetworkHost
    • 0x2e511:$x2: IClientNetworkHost
    • 0x4cda5:$x2: IClientNetworkHost
    • 0x14f97:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x22f09:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x33916:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x41888:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x521aa:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x6011c:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    Process Memory Space: Scan_00059010189_ ref. 004118379411_ pdf.exe PID: 4532JoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 1 entries

      Sigma Overview

      System Summary:

      barindex
      Sigma detected: NanoCoreShow sources
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ProcessId: 5764, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
      Sigma detected: Scheduled temp file as task from temp locationShow sources
      Source: Process startedAuthor: Joe Security: Data: Command: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE5CB.tmp', CommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE5CB.tmp', CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentProcessId: 5764, ProcessCommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE5CB.tmp', ProcessId: 4392

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Antivirus / Scanner detection for submitted sampleShow sources
      Source: Scan_00059010189_ ref. 004118379411_ pdf.exeAvira: detected
      Multi AV Scanner detection for submitted fileShow sources
      Source: Scan_00059010189_ ref. 004118379411_ pdf.exeVirustotal: Detection: 57%Perma Link
      Source: Scan_00059010189_ ref. 004118379411_ pdf.exeReversingLabs: Detection: 58%
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000001.00000002.233831964.0000000003A04000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Scan_00059010189_ ref. 004118379411_ pdf.exe PID: 4532, type: MEMORY
      Machine Learning detection for sampleShow sources
      Source: Scan_00059010189_ ref. 004118379411_ pdf.exeJoe Sandbox ML: detected
      Source: 1.2.Scan_00059010189_ ref. 004118379411_ pdf.exe.760000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen
      Source: 1.0.Scan_00059010189_ ref. 004118379411_ pdf.exe.760000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen
      Source: Scan_00059010189_ ref. 004118379411_ pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: Scan_00059010189_ ref. 004118379411_ pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: RunPE.pdb source: Scan_00059010189_ ref. 004118379411_ pdf.exe, 00000001.00000002.233684353.0000000002A01000.00000004.00000001.sdmp
      Source: Binary string: RegAsm.pdb source: dhcpmon.exe, dhcpmon.exe.2.dr
      Source: Binary string: RegAsm.pdb4 source: dhcpmon.exe, 0000000A.00000002.268427132.00000000007C2000.00000002.00020000.sdmp, dhcpmon.exe, 0000000C.00000002.270489024.0000000000E92000.00000002.00020000.sdmp, dhcpmon.exe.2.dr
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RegAsm.exe, 00000002.00000003.425640561.0000000003F52000.00000004.00000001.sdmp
      Source: global trafficTCP traffic: 192.168.2.5:49714 -> 185.244.38.210:7008
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210
      Source: unknownTCP traffic detected without corresponding DNS query: 185.244.38.210

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000001.00000002.233831964.0000000003A04000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Scan_00059010189_ ref. 004118379411_ pdf.exe PID: 4532, type: MEMORY

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000001.00000002.233831964.0000000003A04000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000001.00000002.233831964.0000000003A04000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: Scan_00059010189_ ref. 004118379411_ pdf.exe PID: 4532, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: Scan_00059010189_ ref. 004118379411_ pdf.exe PID: 4532, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeCode function: 1_2_01111811
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeCode function: 1_2_01111820
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeCode function: 1_2_011115B1
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeCode function: 1_2_011115C0
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeCode function: 1_2_01110682
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 10_2_007C3DFE
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 12_2_00E93DFE
      Source: Scan_00059010189_ ref. 004118379411_ pdf.exe, 00000001.00000002.233684353.0000000002A01000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameRunPE.dll" vs Scan_00059010189_ ref. 004118379411_ pdf.exe
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
      Source: Scan_00059010189_ ref. 004118379411_ pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 00000001.00000002.233831964.0000000003A04000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000001.00000002.233831964.0000000003A04000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: Scan_00059010189_ ref. 004118379411_ pdf.exe PID: 4532, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: Scan_00059010189_ ref. 004118379411_ pdf.exe PID: 4532, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Scan_00059010189_ ref. 004118379411_ pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: Scan_00059010189_ ref. 004118379411_ pdf.exe, hpCGGsxnBfkpZyTC.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 1.2.Scan_00059010189_ ref. 004118379411_ pdf.exe.760000.0.unpack, hpCGGsxnBfkpZyTC.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: 1.0.Scan_00059010189_ ref. 004118379411_ pdf.exe.760000.0.unpack, hpCGGsxnBfkpZyTC.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
      Source: classification engineClassification label: mal100.troj.evad.winEXE@15/14@0/2
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Scan_00059010189_ ref. 004118379411_ pdf.exe.logJump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4944:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{003adc3a-22f1-4bc1-a79f-fc8c7d09606c}
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:408:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3536:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1624:120:WilError_01
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5352:120:WilError_01
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\tmpE5CB.tmpJump to behavior
      Source: Scan_00059010189_ ref. 004118379411_ pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: Scan_00059010189_ ref. 004118379411_ pdf.exeVirustotal: Detection: 57%
      Source: Scan_00059010189_ ref. 004118379411_ pdf.exeReversingLabs: Detection: 58%
      Source: unknownProcess created: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exe 'C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exe'
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE5CB.tmp'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp606.tmp'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 0
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
      Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE5CB.tmp'
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp606.tmp'
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: Scan_00059010189_ ref. 004118379411_ pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: Scan_00059010189_ ref. 004118379411_ pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
      Source: Binary string: RunPE.pdb source: Scan_00059010189_ ref. 004118379411_ pdf.exe, 00000001.00000002.233684353.0000000002A01000.00000004.00000001.sdmp
      Source: Binary string: RegAsm.pdb source: dhcpmon.exe, dhcpmon.exe.2.dr
      Source: Binary string: RegAsm.pdb4 source: dhcpmon.exe, 0000000A.00000002.268427132.00000000007C2000.00000002.00020000.sdmp, dhcpmon.exe, 0000000C.00000002.270489024.0000000000E92000.00000002.00020000.sdmp, dhcpmon.exe.2.dr
      Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: RegAsm.exe, 00000002.00000003.425640561.0000000003F52000.00000004.00000001.sdmp
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 10_2_007C4469 push cs; retf
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 10_2_007C44A3 push es; retf
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 10_2_007C4289 push es; retf
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 12_2_00E94469 push cs; retf
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 12_2_00E944A3 push es; retf
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 12_2_00E94289 push es; retf
      Source: initial sampleStatic PE information: section name: .text entropy: 7.99662602027
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

      Boot Survival:

      barindex
      Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
      Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE5CB.tmp'

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe:Zone.Identifier read attributes | delete
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 4629
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 4928
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: foregroundWindowGot 623
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: foregroundWindowGot 751
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exe TID: 4536Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1460Thread sleep time: -23058430092136925s >= -30000s
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 4604Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4620Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 1132Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeMemory allocated: page read and write | page guard

      HIPS / PFW / Operating System Protection Evasion:

      barindex
      Allocates memory in foreign processesShow sources
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
      Injects a PE file into a foreign processesShow sources
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
      Writes to foreign memory regionsShow sources
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 420000
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 422000
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: A6D008
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE5CB.tmp'
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp606.tmp'
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeQueries volume information: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exe VolumeInformation
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformation
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
      Source: C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000001.00000002.233831964.0000000003A04000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Scan_00059010189_ ref. 004118379411_ pdf.exe PID: 4532, type: MEMORY

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: Scan_00059010189_ ref. 004118379411_ pdf.exe, 00000001.00000002.233831964.0000000003A04000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Source: RegAsm.exe, 00000002.00000003.281602709.0000000006405000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000001.00000002.233831964.0000000003A04000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Scan_00059010189_ ref. 004118379411_ pdf.exe PID: 4532, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management Instrumentation1Scheduled Task/Job1Process Injection311Masquerading2OS Credential DumpingQuery Registry1Remote ServicesArchive Collected Data11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/Job1DLL Side-Loading1Scheduled Task/Job1Virtualization/Sandbox Evasion2LSASS MemorySecurity Software Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)DLL Side-Loading1Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection311NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information2DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing3Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)DLL Side-Loading1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 signatures2 2 Behavior Graph ID: 337758 Sample: Scan_00059010189_ ref. 0041... Startdate: 10/01/2021 Architecture: WINDOWS Score: 100 49 Malicious sample detected (through community Yara rule) 2->49 51 Antivirus / Scanner detection for submitted sample 2->51 53 Sigma detected: Scheduled temp file as task from temp location 2->53 55 6 other signatures 2->55 8 Scan_00059010189_ ref. 004118379411_  pdf.exe 3 2->8         started        12 RegAsm.exe 2 2->12         started        14 dhcpmon.exe 2 2->14         started        16 dhcpmon.exe 1 2->16         started        process3 file4 43 Scan_00059010189_ ...79411_  pdf.exe.log, ASCII 8->43 dropped 59 Writes to foreign memory regions 8->59 61 Allocates memory in foreign processes 8->61 63 Injects a PE file into a foreign processes 8->63 18 RegAsm.exe 1 14 8->18         started        23 conhost.exe 12->23         started        25 conhost.exe 14->25         started        27 conhost.exe 16->27         started        signatures5 process6 dnsIp7 45 185.244.38.210, 49714, 49721, 49727 ASN-QUADRANET-GLOBALUS Netherlands 18->45 47 127.0.0.1 unknown unknown 18->47 37 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 18->37 dropped 39 C:\Users\user\AppData\Local\...\tmpE5CB.tmp, XML 18->39 dropped 41 C:\Program Files (x86)\...\dhcpmon.exe, PE32 18->41 dropped 57 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->57 29 schtasks.exe 1 18->29         started        31 schtasks.exe 1 18->31         started        file8 signatures9 process10 process11 33 conhost.exe 29->33         started        35 conhost.exe 31->35         started       

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      Scan_00059010189_ ref. 004118379411_ pdf.exe58%VirustotalBrowse
      Scan_00059010189_ ref. 004118379411_ pdf.exe59%ReversingLabsByteCode-MSIL.Trojan.Cryptos
      Scan_00059010189_ ref. 004118379411_ pdf.exe100%AviraTR/Dropper.MSIL.Gen
      Scan_00059010189_ ref. 004118379411_ pdf.exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%MetadefenderBrowse
      C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe0%ReversingLabs

      Unpacked PE Files

      SourceDetectionScannerLabelLinkDownload
      1.2.Scan_00059010189_ ref. 004118379411_ pdf.exe.760000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File
      1.0.Scan_00059010189_ ref. 004118379411_ pdf.exe.760000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File

      Domains

      No Antivirus matches

      URLs

      No Antivirus matches

      Domains and IPs

      Contacted Domains

      No contacted domains info

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPDomainCountryFlagASNASN NameMalicious
      185.244.38.210
      unknownNetherlands
      8100ASN-QUADRANET-GLOBALUSfalse

      Private

      IP
      127.0.0.1

      General Information

      Joe Sandbox Version:31.0.0 Red Diamond
      Analysis ID:337758
      Start date:10.01.2021
      Start time:08:24:23
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 8m 49s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:Scan_00059010189_ ref. 004118379411_ pdf.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:38
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.troj.evad.winEXE@15/14@0/2
      EGA Information:Failed
      HDC Information:
      • Successful, ratio: 2.3% (good quality ratio 2%)
      • Quality average: 65.9%
      • Quality standard deviation: 26.6%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .exe
      Warnings:
      Show All
      • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
      • TCP Packets have been reduced to 100
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      Errors:
      • Sigma syntax error: Has an empty selector, Rule: Abusing Azure Browser SSO

      Simulations

      Behavior and APIs

      TimeTypeDescription
      08:25:23AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
      08:25:30Task SchedulerRun new task: DHCP Monitor path: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" s>$(Arg0)
      08:25:30API Interceptor1340x Sleep call for process: RegAsm.exe modified
      08:25:31Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)

      Joe Sandbox View / Context

      IPs

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      185.244.38.210Payment_Confirmation pdf.exeGet hashmaliciousBrowse

        Domains

        No context

        ASN

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        ASN-QUADRANET-GLOBALUSnh8712Nx5J.xlsGet hashmaliciousBrowse
        • 185.174.102.105
        Payment_Confirmation pdf.exeGet hashmaliciousBrowse
        • 185.244.38.210
        npp.7.9.2.Installer (1).exeGet hashmaliciousBrowse
        • 192.169.6.95
        https://linkprotect.cudasvc.com/url?a=http%3a%2f%2ffindcloud.id%2fwp-includes%2f8JTmzq3FN6z3OBJBdBCfXrdcZl5H7ZxOaOZzfl2H%2f&c=E,1,2CiyC7FGbs3Pvr1yrAWkewOmRL-xyrP42HL37xX4omRyLZqRrqWOt_1RKb6pLtfzxs7zIBTrrVMEwQ8pOUIr2mFuNwrd9eHNrfkptUp83QPlV-CrGIoXMw,,&typo=1Get hashmaliciousBrowse
        • 173.254.250.226
        https://mrveggy.com/resgatecarrinho/jcWVa69vj8IDsQRCud8h6RNI9Mz17JqsPPJ0DFnlbXZGyMM2GcZ3/Get hashmaliciousBrowse
        • 173.254.250.226
        1I72L29IL3F.docGet hashmaliciousBrowse
        • 173.254.250.226
        https://x9sademwnet.gb.net/bnbgfvgrthbg456tr54g6trvecds/?tuk5sx4dsb3=7df34dj4csaGet hashmaliciousBrowse
        • 104.129.25.9
        xLH4kwOjXR.exeGet hashmaliciousBrowse
        • 104.223.94.66
        utox.exeGet hashmaliciousBrowse
        • 104.223.122.15
        QUOTES.exeGet hashmaliciousBrowse
        • 69.174.99.26
        file.exeGet hashmaliciousBrowse
        • 192.161.187.200
        http://jb092.com/rxlbakzd/goqmmbmi.html?kjmikw5x.3hllrGet hashmaliciousBrowse
        • 185.174.103.81
        https://www.trackins.org/sale/cat/sale-c199387IoAL&C_fTkoAvATBo-1LAvvTgoAKL6_.T5.html?_emr=12e4edca-8183-44e0-bccb-e3d6e0eeb447&wfcs=cs2&dcrectxid=d48055ba-93d6-4b3f-80c6-70de3252bde6&_eml=2ec38d65-f3da-4587-bd38-7c1f333c6dc8&source=batch&batchid=04&varid=5&csnid=1eab81b4-e54d-4cc2-8735-a5d571cfe688&brcid=13&sm=1&refid=MKTEML_31000&emlid=1131&maiid=1913Get hashmaliciousBrowse
        • 173.205.83.250
        Shipment Document BLINV And Packing List Attached.exeGet hashmaliciousBrowse
        • 192.161.187.200
        kWbmxCNnPIYLMvvPIVlMbDKbbQCNjT.exeGet hashmaliciousBrowse
        • 69.174.99.26
        Purchase Order.exeGet hashmaliciousBrowse
        • 104.129.26.162
        SecuriteInfo.com.Variant.Bulz.265335.2250.exeGet hashmaliciousBrowse
        • 66.63.162.20
        New order.xlsGet hashmaliciousBrowse
        • 66.63.162.20
        https://app.box.com/s/rdobxcyrhp1cdxwej3pfeyvngfh3lwagGet hashmaliciousBrowse
        • 173.254.237.250
        https://bit.ly/2VPfIROGet hashmaliciousBrowse
        • 185.174.103.81

        JA3 Fingerprints

        No context

        Dropped Files

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exehfix.exeGet hashmaliciousBrowse
          atikmdag-patcher 1.4.8.exeGet hashmaliciousBrowse
            Client1.exeGet hashmaliciousBrowse
              miner.exeGet hashmaliciousBrowse
                PhoenixMiner_5.4c_Windows.exeGet hashmaliciousBrowse
                  74725794.exeGet hashmaliciousBrowse
                    PO-498475-ORDER.vbsGet hashmaliciousBrowse
                      Payment Advice Note from 19.11.2020.exeGet hashmaliciousBrowse
                        SUSPENSION LETTER ON SIM SWAP.pdf.exeGet hashmaliciousBrowse
                          kiiDjfpu2x.exeGet hashmaliciousBrowse
                            invoice copy.exeGet hashmaliciousBrowse
                              purchase_order.exeGet hashmaliciousBrowse
                                LC No 075120020789.exeGet hashmaliciousBrowse
                                  pRTOIqmIH5.exeGet hashmaliciousBrowse
                                    M9Xn52MsfG.exeGet hashmaliciousBrowse
                                      ycqE1CONpY.exeGet hashmaliciousBrowse
                                        SecuriteInfo.com.Trojan.PackedNET.461.28807.exeGet hashmaliciousBrowse
                                          SecuriteInfo.com.Trojan.PackedNET.461.31996.exeGet hashmaliciousBrowse
                                            7RP240Rsf3.exeGet hashmaliciousBrowse
                                              JPY79XL8cl.exeGet hashmaliciousBrowse

                                                Created / dropped Files

                                                C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Category:dropped
                                                Size (bytes):64616
                                                Entropy (8bit):6.037264560032456
                                                Encrypted:false
                                                SSDEEP:768:J8XcJiMjm2ieHlPyCsSuJbn8dBhFVBSMQ6Iq8TSYDKpgLaDViRLNdr:9YMaNylPYSAb8dBnTHv8DKKaDVkX
                                                MD5:6FD7592411112729BF6B1F2F6C34899F
                                                SHA1:5E5C839726D6A43C478AB0B95DBF52136679F5EA
                                                SHA-256:FFE4480CCC81B061F725C54587E9D1BA96547D27FE28083305D75796F2EB3E74
                                                SHA-512:21EFCC9DEE3960F1A64C6D8A44871742558666BB792D77ACE91236C7DBF42A6CA77086918F363C4391D9C00904C55A952E2C18BE5FA1A67A509827BFC630070D
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: Metadefender, Detection: 0%, Browse
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Joe Sandbox View:
                                                • Filename: hfix.exe, Detection: malicious, Browse
                                                • Filename: atikmdag-patcher 1.4.8.exe, Detection: malicious, Browse
                                                • Filename: Client1.exe, Detection: malicious, Browse
                                                • Filename: miner.exe, Detection: malicious, Browse
                                                • Filename: PhoenixMiner_5.4c_Windows.exe, Detection: malicious, Browse
                                                • Filename: 74725794.exe, Detection: malicious, Browse
                                                • Filename: PO-498475-ORDER.vbs, Detection: malicious, Browse
                                                • Filename: Payment Advice Note from 19.11.2020.exe, Detection: malicious, Browse
                                                • Filename: SUSPENSION LETTER ON SIM SWAP.pdf.exe, Detection: malicious, Browse
                                                • Filename: kiiDjfpu2x.exe, Detection: malicious, Browse
                                                • Filename: invoice copy.exe, Detection: malicious, Browse
                                                • Filename: purchase_order.exe, Detection: malicious, Browse
                                                • Filename: LC No 075120020789.exe, Detection: malicious, Browse
                                                • Filename: pRTOIqmIH5.exe, Detection: malicious, Browse
                                                • Filename: M9Xn52MsfG.exe, Detection: malicious, Browse
                                                • Filename: ycqE1CONpY.exe, Detection: malicious, Browse
                                                • Filename: SecuriteInfo.com.Trojan.PackedNET.461.28807.exe, Detection: malicious, Browse
                                                • Filename: SecuriteInfo.com.Trojan.PackedNET.461.31996.exe, Detection: malicious, Browse
                                                • Filename: 7RP240Rsf3.exe, Detection: malicious, Browse
                                                • Filename: JPY79XL8cl.exe, Detection: malicious, Browse
                                                Reputation:moderate, very likely benign file
                                                Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...xX.Z..............0.............^.... ........@.. ....................... ............`.....................................O.......8...............h>........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):42
                                                Entropy (8bit):4.0050635535766075
                                                Encrypted:false
                                                SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                                                MD5:84CFDB4B995B1DBF543B26B86C863ADC
                                                SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                                                SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                                                SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Scan_00059010189_ ref. 004118379411_ pdf.exe.log
                                                Process:C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):522
                                                Entropy (8bit):5.348034597186669
                                                Encrypted:false
                                                SSDEEP:12:Q3La/hz92n4M9tDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhav:MLU84qpE4Ks2wKDE4KhK3VZ9pKhk
                                                MD5:D4AF6B20AEA9906B4FF574A174E96287
                                                SHA1:81655019BB100FAADD5B36755F798EE5FB09E672
                                                SHA-256:DD8AE93DA079839B31327D22A2408E0C3EA4DDE92FD389CD5B96AD57CCE7B2E1
                                                SHA-512:6D912AC17876D9C21E61ED8C1B435AEA0FBB27FB97626A40903B4DFFC1204BEF3A43B02805DEDD2531822FD6F62CF06F0D758C1B2CA07258E82F95225D71C16E
                                                Malicious:true
                                                Reputation:moderate, very likely benign file
                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                                                C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):42
                                                Entropy (8bit):4.0050635535766075
                                                Encrypted:false
                                                SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                                                MD5:84CFDB4B995B1DBF543B26B86C863ADC
                                                SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                                                SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                                                SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                                                Malicious:false
                                                Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                                                C:\Users\user\AppData\Local\Temp\tmp606.tmp
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1310
                                                Entropy (8bit):5.109425792877704
                                                Encrypted:false
                                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
                                                MD5:5C2F41CFC6F988C859DA7D727AC2B62A
                                                SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
                                                SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
                                                SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
                                                Malicious:false
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                C:\Users\user\AppData\Local\Temp\tmpE5CB.tmp
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1319
                                                Entropy (8bit):5.134254141338449
                                                Encrypted:false
                                                SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0mxz5xtn:cbk4oL600QydbQxIYODOLedq3Zxz5j
                                                MD5:48EF7FA9033389AD7929D7A6B9D10298
                                                SHA1:9DB6CB7325C8BDF66A15F7B5F34703709A45AEB6
                                                SHA-256:0C1B5F67EEB276D1D4205B138CE32BC6149924E02281A2DB8E4623A700E88F15
                                                SHA-512:AC8BD104ECBACC9BCCCE9E087F67E5B18072D59367CCD31D4E66132B6BAAEA520CBA5B9B59464483D86ABF74826B382C402F12E9A586C99BDA8C78A0DE33944E
                                                Malicious:true
                                                Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\catalog.dat
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):2232
                                                Entropy (8bit):7.108278141116062
                                                Encrypted:false
                                                SSDEEP:48:SUzDgcUzDgcUzDgcUzDgcUzDgcUzDgcUzDgcUzDgcUzDgd:nMMMMMMMMk
                                                MD5:D0CECEFBB6FCD57CDF6D49B3E30AD972
                                                SHA1:BA83D28BB3EBBB383D5A64F5ABF4E1804CFE5A7D
                                                SHA-256:90CD93824ED95C0CB0E805CC42196D8A81538B8152A08B2EA00736BA22DDE2F0
                                                SHA-512:36789EFE742431D38E6508AEC3F15F4F0579EC44C63E659C422904D0A236D55A70347C91817CF39274BC34F244D8C697E2E4FFAB331FF6939579743F397CAAEC
                                                Malicious:false
                                                Preview: >........]Z.S..._;yF..6..p..GK.>0hn....EY.+..U..y.Z..t.Z...k....s..\.'.i..pr....Y..Y..q......'..z..P.....:.....F[?..6My|...5.............".@..i,F.H....H.....|U.y.,...z...}...,:...C{v.Q.5.......&.:.Z.}.. ..3..T..........^3...f.1......7%.]..2_>........]Z.S..._;yF..6..p..GK.>0hn....EY.+..U..y.Z..t.Z...k....s..\.'.i..pr....Y..Y..q......'..z..P.....:.....F[?..6My|...5.............".@..i,F.H....H.....|U.y.,...z...}...,:...C{v.Q.5.......&.:.Z.}.. ..3..T..........^3...f.1......7%.]..2_>........]Z.S..._;yF..6..p..GK.>0hn....EY.+..U..y.Z..t.Z...k....s..\.'.i..pr....Y..Y..q......'..z..P.....:.....F[?..6My|...5.............".@..i,F.H....H.....|U.y.,...z...}...,:...C{v.Q.5.......&.:.Z.}.. ..3..T..........^3...f.1......7%.]..2_>........]Z.S..._;yF..6..p..GK.>0hn....EY.+..U..y.Z..t.Z...k....s..\.'.i..pr....Y..Y..q......'..z..P.....:.....F[?..6My|...5.............".@..i,F.H....H.....|U.y.,...z...}...,:...C{v.Q.5.......&.:.Z.}.. ..3..T..........^3...f.1......7%.]..2_>......
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                File Type:Non-ISO extended-ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):8
                                                Entropy (8bit):3.0
                                                Encrypted:false
                                                SSDEEP:3:Tt:h
                                                MD5:250442B41A1BC064560EF4F540927AC8
                                                SHA1:FDCFF45A028F804339F044080C2FB8BECB38CB29
                                                SHA-256:A83C93546468FE86A6CE1A8A01A8779C001D50DA4D3108BB3AB9150746A758B5
                                                SHA-512:C9850CE77471752369464B559D9C80C4977E9F02BFAD92B17F56AAEF53D095F7262DCF63E45C4380AA1EC1D1DA9F427B1CEAF45C5C894D3A23176D6017CE56FF
                                                Malicious:true
                                                Preview: .%.R...H
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\settings.bin
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):40
                                                Entropy (8bit):5.221928094887364
                                                Encrypted:false
                                                SSDEEP:3:9bzY6oRDMjmPl:RzWDMCd
                                                MD5:AE0F5E6CE7122AF264EC533C6B15A27B
                                                SHA1:1265A495C42EED76CC043D50C60C23297E76CCE1
                                                SHA-256:73B0B92179C61C26589B47E9732CE418B07EDEE3860EE5A2A5FB06F3B8AA9B26
                                                SHA-512:DD44C2D24D4E3A0F0B988AD3D04683B5CB128298043134649BBE33B2512CE0C9B1A8E7D893B9F66FBBCDD901E2B0646C4533FB6C0C8C4AFCB95A0EFB95D446F8
                                                Malicious:false
                                                Preview: 9iH...}Z.4..f..... 8.j....|.&X..e.F.*.
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\storage.dat
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):327432
                                                Entropy (8bit):7.99938831605763
                                                Encrypted:true
                                                SSDEEP:6144:oX44S90aTiB66x3Pl6nGV4bfD6wXPIZ9iBj0UeprGm2d7Tm:LkjYGsfGUc9iB4UeprKdnm
                                                MD5:7E8F4A764B981D5B82D1CC49D341E9C6
                                                SHA1:D9F0685A028FB219E1A6286AEFB7D6FCFC778B85
                                                SHA-256:0BD3AAC12623520C4E2031C8B96B4A154702F36F97F643158E91E987D317B480
                                                SHA-512:880E46504FCFB4B15B86B9D8087BA88E6C4950E433616EBB637799F42B081ABF6F07508943ECB1F786B2A89E751F5AE62D750BDCFFDDF535D600CF66EC44E926
                                                Malicious:false
                                                Preview: pT..!..W..G.J..a.).@.i..wpK.so@...5.=.^..Q.oy.=e@9.B...F..09u"3.. 0t..RDn_4d.....E...i......~...|..fX_...Xf.p^......>a..$...e.6:7d.(a.A...=.)*.....{B.[...y%.*..i.Q.<..xt.X..H.. ..HF7g...I.*3.{.n....L.y;i..s-....(5i...........J.5b7}..fK..HV..,...0.... ....n.w6PMl.......v."".v.......#..X.a....../...cC...i..l{>5n.._+.e.d'...}...[..../...D.t..GVp.zz......(...o......b...+`J.{....hS1G.^*I..v&.jm.#u..1..Mg!.E..U.T.....6.2>...6.l.K.w"o..E..."K%{....z.7....<...,....]t.:.....[.Z.u...3X8.QI..j_.&..N..q.e.2...6.R.~..9.Bq..A.v.6.G..#y.....O....Z)G...w..E..k(....+..O..........Vg.2xC......O...jc.....z..~.P...q../.-.'.h.._.cj.=..B.x.Q9.pu.|i4...i...;O...n.?.,. ....v?.5}.OY@.dG|<.._[.69@.2..m..I..oP=...xrK.?............b..5....i&...l.c\b}..Q..O+.V.mJ.....pz....>F.......H...6$...d...|m...N..1.R..B.i..........$....$........CY}..$....r.....H...8...li.....7 P......?h....R.iF..6...q(.@LI.s..+K.....?m..H....*. l..&<}....`|.B....3.....I..o...u1..8i=.z.W..7
                                                C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):56
                                                Entropy (8bit):4.823079645651109
                                                Encrypted:false
                                                SSDEEP:3:oMty8WddSWAnPL4A:oMLW6WAnPL4A
                                                MD5:743A1D76D284D8E42E19061A3F13A723
                                                SHA1:D6BBE641CBAC7B46C0922F32DCC89F8F5B87F98C
                                                SHA-256:86093BF03032ACFCEF934A0D8363B66AAF4ADEE58015DA0172E13635B1DD1FE8
                                                SHA-512:DF687DCD985D1F6127624220083DFD93A39FEBCE02A869F4126787DF3724890ECC10FF18077BFDEF02FCC802440F3F83545E4DA4BD826DC84E59B26A105F6567
                                                Malicious:false
                                                Preview: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                \Device\ConDrv
                                                Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):1049
                                                Entropy (8bit):4.2989523990568035
                                                Encrypted:false
                                                SSDEEP:24:z3U3g4DO/0XZd3Wo3opQ5ZKBQFYVgt7ovrNOYlK:zEw4DBXZxo4ABV+SrUYE
                                                MD5:970EE6AEAB63008333D1D883327DA660
                                                SHA1:A71E19F66886B1888A183BA1777A23FABAE9822E
                                                SHA-256:D270D397EB3CF1173D25795834B240466EFEE213E11B1B31CDC101015AFFCAD9
                                                SHA-512:EB49AEE1B4524E6F15C08345A380D7D28DC845DEBA5408A7D034F2F7F5A652C8A2E2FF293BFB307DE87DCC2FAA111BA3BE8BEF9C4752A73DE1835DCD844D39BB
                                                Malicious:false
                                                Preview: Microsoft .NET Framework Assembly Registration Utility version 4.7.3056.0..for Microsoft .NET Framework version 4.7.3056.0..Copyright (C) Microsoft Corporation. All rights reserved.....Syntax: RegAsm AssemblyName [Options]..Options:.. /unregister Unregister types.. /tlb[:FileName] Export the assembly to the specified type library.. and register it.. /regfile[:FileName] Generate a reg file with the specified name.. instead of registering the types. This option.. cannot be used with the /u or /tlb options.. /codebase Set the code base in the registry.. /registered Only refer to already registered type libraries.. /asmpath:Directory Look for assembly references here.. /nologo Prevents RegAsm from displaying logo.. /silent Silent mode. Prevents displaying of success messages.. /verbose Displays extra information..

                                                Static File Info

                                                General

                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):7.664479719371558
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                • DOS Executable Generic (2002/1) 0.01%
                                                File name:Scan_00059010189_ ref. 004118379411_ pdf.exe
                                                File size:352256
                                                MD5:106117a9928b774aa6bbb657f275de53
                                                SHA1:208d61ecd30789fba2325a0e0f46bb63bdba5bd9
                                                SHA256:a5affcfc364530db52dd4fcf252187cc09968a7bb1f1149bb919fd339634468a
                                                SHA512:821b25876ccdf80a77714618766a0578898f6671755a1e399d1d5ab7302ceaa9d67b6ed37964dad27088996823c5bd2db312eb0fd5dc00123d294800797c24f1
                                                SSDEEP:6144:SiS9IvO+J0i2ttjKd4aOLlLFIbJU+M2ucUcjwxvHVZ0y1UCgVhjX5+:SEvO+l2ttKdpYLFI3XucMx/f0ymCuh
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....'._.................L...........k... ........@.. ....................................@................................

                                                File Icon

                                                Icon Hash:8e9ab2a29a8a82d4

                                                Static PE Info

                                                General

                                                Entrypoint:0x446b8e
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                Time Stamp:0x5FFA270C [Sat Jan 9 21:58:36 2021 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:v4.0.30319
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                Entrypoint Preview

                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al

                                                Data Directories

                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x46b380x53.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x480000x10e24.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x5a0000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                Sections

                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000x44b940x44c00False0.983899147727data7.99662602027IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                .rsrc0x480000x10e240x11000False0.09765625data4.29496295357IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x5a0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                Resources

                                                NameRVASizeTypeLanguageCountry
                                                RT_ICON0x481300x10828dBase III DBT, version number 0, next free block index 40
                                                RT_GROUP_ICON0x589580x14data
                                                RT_VERSION0x5896c0x2ccdata
                                                RT_MANIFEST0x58c380x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                Imports

                                                DLLImport
                                                mscoree.dll_CorExeMain

                                                Version Infos

                                                DescriptionData
                                                Translation0x0000 0x04b0
                                                LegalCopyright
                                                Assembly Version0.0.0.0
                                                InternalNameScan_00059010189_ ref. 004118379411_ pdf.exe
                                                FileVersion0.0.0.0
                                                ProductVersion0.0.0.0
                                                FileDescription
                                                OriginalFilenameScan_00059010189_ ref. 004118379411_ pdf.exe

                                                Network Behavior

                                                Network Port Distribution

                                                TCP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 10, 2021 08:25:30.821877003 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:30.999865055 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:31.001878977 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:31.047482014 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:31.235569000 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:31.235827923 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:31.463349104 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:31.465738058 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:31.644119978 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:31.701517105 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:31.864511967 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.092422009 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.101799965 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.101877928 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.101939917 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.101984978 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.102025032 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.102041006 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.102072954 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.102082014 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.102135897 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.102139950 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.102194071 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.102240086 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.102243900 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.102302074 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.102354050 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.279844999 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.279941082 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.279968977 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.279994965 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.280020952 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.280040026 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.280044079 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.280065060 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.280083895 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.280095100 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.280105114 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.280119896 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.280131102 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.280153990 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.280167103 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.280178070 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.280205011 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.280220032 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.280227900 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.280241966 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.280256033 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.280284882 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.280287027 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.280312061 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.280335903 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.280350924 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.280358076 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.280385017 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.280401945 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.280440092 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.458045959 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458072901 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458096027 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458122969 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458148956 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458178043 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458201885 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458203077 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.458224058 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458240032 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.458254099 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458282948 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458302975 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.458307028 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458340883 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458347082 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.458365917 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458394051 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458394051 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.458415985 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458444118 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458446026 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.458468914 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458494902 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.458497047 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458518982 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458549023 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.458550930 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458575964 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458604097 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458605051 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.458626986 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458656073 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458657026 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.458678007 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458704948 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458713055 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.458729029 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458760023 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458765984 CET497147008192.168.2.5185.244.38.210
                                                Jan 10, 2021 08:25:32.458787918 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458815098 CET700849714185.244.38.210192.168.2.5
                                                Jan 10, 2021 08:25:32.458841085 CET700849714185.244.38.210192.168.2.5

                                                Code Manipulations

                                                Statistics

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:08:25:16
                                                Start date:10/01/2021
                                                Path:C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Users\user\Desktop\Scan_00059010189_ ref. 004118379411_ pdf.exe'
                                                Imagebase:0x760000
                                                File size:352256 bytes
                                                MD5 hash:106117A9928B774AA6BBB657F275DE53
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.233831964.0000000003A04000.00000004.00000001.sdmp, Author: Florian Roth
                                                • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.233831964.0000000003A04000.00000004.00000001.sdmp, Author: Joe Security
                                                • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.233831964.0000000003A04000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                Reputation:low

                                                General

                                                Start time:08:25:17
                                                Start date:10/01/2021
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                Imagebase:0x7f0000
                                                File size:64616 bytes
                                                MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Reputation:moderate

                                                General

                                                Start time:08:25:22
                                                Start date:10/01/2021
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmpE5CB.tmp'
                                                Imagebase:0x390000
                                                File size:185856 bytes
                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:25:28
                                                Start date:10/01/2021
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7ecfc0000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:25:29
                                                Start date:10/01/2021
                                                Path:C:\Windows\SysWOW64\schtasks.exe
                                                Wow64 process (32bit):true
                                                Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp606.tmp'
                                                Imagebase:0x390000
                                                File size:185856 bytes
                                                MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:25:29
                                                Start date:10/01/2021
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7ecfc0000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:25:30
                                                Start date:10/01/2021
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                Wow64 process (32bit):true
                                                Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe 0
                                                Imagebase:0x7ff797770000
                                                File size:64616 bytes
                                                MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Reputation:moderate

                                                General

                                                Start time:08:25:31
                                                Start date:10/01/2021
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7ecfc0000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:25:31
                                                Start date:10/01/2021
                                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
                                                Imagebase:0x7c0000
                                                File size:64616 bytes
                                                MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Antivirus matches:
                                                • Detection: 0%, Metadefender, Browse
                                                • Detection: 0%, ReversingLabs
                                                Reputation:moderate

                                                General

                                                Start time:08:25:31
                                                Start date:10/01/2021
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7ecfc0000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                General

                                                Start time:08:25:33
                                                Start date:10/01/2021
                                                Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                                                Wow64 process (32bit):true
                                                Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                                                Imagebase:0xe90000
                                                File size:64616 bytes
                                                MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Reputation:moderate

                                                General

                                                Start time:08:25:34
                                                Start date:10/01/2021
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff7ecfc0000
                                                File size:625664 bytes
                                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high

                                                Disassembly

                                                Code Analysis

                                                Reset < >