Loading ...

Play interactive tourEdit tour

Analysis Report Invoice# 77-83992-8297382 (2).exe

Overview

General Information

Sample Name:Invoice# 77-83992-8297382 (2).exe
Analysis ID:339193
MD5:4c67eb7b3f4ea88e5e5487ade487de3f
SHA1:d118ae4beef890783251d53f3f7fe5e6c9a65a10
SHA256:db433304c3e22d8222cfe510e8548515c9dccfc9f080f94efc67aa11f44a6b3f
Tags:exeNanoCore

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Antivirus or Machine Learning detection for unpacked file
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

Startup

  • System is w10x64
  • dhcpmon.exe (PID: 1020 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 4C67EB7B3F4EA88E5E5487ADE487DE3F)
    • dhcpmon.exe (PID: 6228 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 4C67EB7B3F4EA88E5E5487ADE487DE3F)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.619051050.0000000004069000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000001.00000002.619051050.0000000004069000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x2ee5:$a: NanoCore
    • 0x2f3e:$a: NanoCore
    • 0x2f7b:$a: NanoCore
    • 0x2ff4:$a: NanoCore
    • 0x1669f:$a: NanoCore
    • 0x166b4:$a: NanoCore
    • 0x166e9:$a: NanoCore
    • 0x2f173:$a: NanoCore
    • 0x2f188:$a: NanoCore
    • 0x2f1bd:$a: NanoCore
    • 0x2f47:$b: ClientPlugin
    • 0x2f84:$b: ClientPlugin
    • 0x3882:$b: ClientPlugin
    • 0x388f:$b: ClientPlugin
    • 0x1645b:$b: ClientPlugin
    • 0x16476:$b: ClientPlugin
    • 0x164a6:$b: ClientPlugin
    • 0x166bd:$b: ClientPlugin
    • 0x166f2:$b: ClientPlugin
    • 0x2ef2f:$b: ClientPlugin
    • 0x2ef4a:$b: ClientPlugin
    00000001.00000002.621166702.00000000059E0000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xf7ad:$x1: NanoCore.ClientPluginHost
    • 0xf7da:$x2: IClientNetworkHost
    00000001.00000002.621166702.00000000059E0000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xf7ad:$x2: NanoCore.ClientPluginHost
    • 0x10888:$s4: PipeCreated
    • 0xf7c7:$s5: IClientLoggingHost
    00000001.00000002.621166702.00000000059E0000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 43 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      1.2.Invoice# 77-83992-8297382 (2).exe.5730000.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      1.2.Invoice# 77-83992-8297382 (2).exe.5730000.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x1018d:$x1: NanoCore.ClientPluginHost
      • 0x101ca:$x2: IClientNetworkHost
      • 0x13cfd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xff05:$x1: NanoCore Client.exe
      • 0x1018d:$x2: NanoCore.ClientPluginHost
      • 0x117c6:$s1: PluginCommand
      • 0x117ba:$s2: FileCommand
      • 0x1266b:$s3: PipeExists
      • 0x18422:$s4: PipeCreated
      • 0x101b7:$s5: IClientLoggingHost
      1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 11 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe, ProcessId: 5800, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 26%
        Multi AV Scanner detection for submitted fileShow sources
        Source: Invoice# 77-83992-8297382 (2).exeReversingLabs: Detection: 26%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000001.00000002.619051050.0000000004069000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.621166702.00000000059E0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.300827633.00000000044AF000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.613044676.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.244571473.0000000004A9F000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.307110365.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.243948615.0000000004909000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.616036115.0000000003021000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.243390482.0000000003FC1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.308355679.0000000003C49000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.297386701.0000000004319000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.308252762.0000000002C41000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Invoice# 77-83992-8297382 (2).exe PID: 4120, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Invoice# 77-83992-8297382 (2).exe PID: 5800, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1020, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6228, type: MEMORY
        Source: Yara matchFile source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.Invoice# 77-83992-8297382 (2).exe.59e0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.Invoice# 77-83992-8297382 (2).exe.59e0000.4.raw.unpack, type: UNPACKEDPE
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 7.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.59e0000.4.unpackAvira: Label: TR/NanoCore.fadte
        Source: Invoice# 77-83992-8297382 (2).exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: Invoice# 77-83992-8297382 (2).exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 4x nop then jmp 016AEB76h
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 4x nop then mov esp, ebp
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 4x nop then jmp 016AEB76h
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 4x nop then mov esp, ebp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then jmp 00DBEB76h
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then mov esp, ebp
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then mov esp, ebp
        Source: global trafficTCP traffic: 192.168.2.3:49712 -> 194.5.97.173:10004
        Source: unknownDNS traffic detected: queries for: 1.ispnano.dns-cloud.net
        Source: Invoice# 77-83992-8297382 (2).exe, 00000000.00000003.233824722.0000000001326000.00000004.00000001.sdmpString found in binary or memory: http://go.microsoft.c
        Source: Invoice# 77-83992-8297382 (2).exe, 00000000.00000002.240339078.00000000016E9000.00000004.00000040.sdmpString found in binary or memory: http://ns.ado/Ident
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.619051050.0000000004069000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000001.00000002.619051050.0000000004069000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.621166702.00000000059E0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.300827633.00000000044AF000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.613044676.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.244571473.0000000004A9F000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.307110365.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.243948615.0000000004909000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.616036115.0000000003021000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.243390482.0000000003FC1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.308355679.0000000003C49000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.297386701.0000000004319000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.308252762.0000000002C41000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Invoice# 77-83992-8297382 (2).exe PID: 4120, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Invoice# 77-83992-8297382 (2).exe PID: 5800, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1020, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6228, type: MEMORY
        Source: Yara matchFile source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.Invoice# 77-83992-8297382 (2).exe.59e0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.Invoice# 77-83992-8297382 (2).exe.59e0000.4.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000001.00000002.619051050.0000000004069000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.621166702.00000000059E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.300827633.00000000044AF000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.300827633.00000000044AF000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.613044676.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000001.00000002.613044676.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.244571473.0000000004A9F000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.244571473.0000000004A9F000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.307110365.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.307110365.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.243948615.0000000004909000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.243948615.0000000004909000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.243390482.0000000003FC1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.243390482.0000000003FC1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000007.00000002.308355679.0000000003C49000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000004.00000002.297386701.0000000004319000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000004.00000002.297386701.0000000004319000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000001.00000002.620857692.0000000005730000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000007.00000002.308252762.0000000002C41000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: Invoice# 77-83992-8297382 (2).exe PID: 4120, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: Invoice# 77-83992-8297382 (2).exe PID: 4120, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: Invoice# 77-83992-8297382 (2).exe PID: 5800, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: Invoice# 77-83992-8297382 (2).exe PID: 5800, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 1020, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 1020, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 6228, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 6228, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.5730000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.59e0000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 7.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.59e0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: Invoice# 77-83992-8297382 (2).exe
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_0F2E2FE8 CreateProcessAsUserW,
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_016AB180
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_016AEBA0
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_016AE3B0
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_016A9A50
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_016A0448
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_016ACC40
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_016A6C10
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_016A34F8
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_016A8F58
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_016AB170
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_016AE3A0
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_016AEB90
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_016A9A3F
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_016ACC30
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_016A8F4A
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_016AF648
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_0F2E4748
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_0F2E1EA8
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_0F2E0040
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_0F2E4738
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_0F2E5368
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_0F2E1620
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_0F2E1E9D
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_0F2E2930
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_0F2E11A8
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 0_2_0F2E35F0
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 1_2_02F0E480
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 1_2_02F0E471
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 1_2_02F0BBD4
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeCode function: 1_2_066B0040
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00DBB170
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00DB9A3F
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00DBEBA0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00DBE3A0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00DB34F8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00DB0448
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00DB3C60
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00DB6C10
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00DBCC30
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00DB8F4A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00DBEB90
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00DB0427
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_00DBF658
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_0E994748
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_0E991F60
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_0E990040
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_0E991620
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_0E994738
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_0E991F51
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_0E995368
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_0E9911A8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_0E9929A8
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4_2_0E9935F0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 7_2_0126E471
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 7_2_0126E480
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 7_2_0126BBD4
        Source: Invoice# 77-83992-8297382 (2).exe, 00000000.00000002.245504993.0000000005830000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Invoice# 77-83992-8297382 (2).exe
        Source: Invoice# 77-83992-8297382 (2).exe, 00000000.00000000.220656885.0000000000D02000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameStub52.exe. vs Invoice# 77-83992-8297382 (2).exe
        Source: Invoice# 77-83992-8297382 (2).exe, 00000000.00000002.243390482.0000000003FC1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSHCore1.dll0 vs Invoice# 77-83992-8297382 (2).exe
        Source: Invoice# 77-83992-8297382 (2).exe, 00000000.00000002.240375788.0000000002FB1000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameRunPe6.dll" vs Invoice# 77-83992-8297382 (2).exe
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.621984474.0000000006F40000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs Invoice# 77-83992-8297382 (2).exe
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.619051050.0000000004069000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs Invoice# 77-83992-8297382 (2).exe
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.619051050.0000000004069000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs Invoice# 77-83992-8297382 (2).exe
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.619051050.0000000004069000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs Invoice# 77-83992-8297382 (2).exe
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.621320469.0000000006200000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Invoice# 77-83992-8297382 (2).exe
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000003.243082118.00000000014BF000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameStub52.exe. vs Invoice# 77-83992-8297382 (2).exe
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.615231415.000000000144A000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Invoice# 77-83992-8297382 (2).exe
        Source: Invoice# 77-83992-8297382 (2).exeBinary or memory string: OriginalFilenameStub52.exe. vs Invoice# 77-83992-8297382 (2).exe
        Source: Invoice# 77-83992-8297382 (2).exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000001.00000002.619051050.0000000004069000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.621166702.00000000059E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.621166702.00000000059E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000004.00000002.300827633.00000000044AF000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.300827633.00000000044AF000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.613044676.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.613044676.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.244571473.0000000004A9F000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.244571473.0000000004A9F000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.307110365.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000007.00000002.307110365.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.243948615.0000000004909000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.243948615.0000000004909000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.243390482.0000000003FC1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.243390482.0000000003FC1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000007.00000002.308355679.0000000003C49000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000004.00000002.297386701.0000000004319000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000004.00000002.297386701.0000000004319000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000001.00000002.620857692.0000000005730000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000001.00000002.620857692.0000000005730000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000007.00000002.308252762.0000000002C41000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: Invoice# 77-83992-8297382 (2).exe PID: 4120, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: Invoice# 77-83992-8297382 (2).exe PID: 4120, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: Invoice# 77-83992-8297382 (2).exe PID: 5800, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: Invoice# 77-83992-8297382 (2).exe PID: 5800, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 1020, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 1020, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 6228, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 6228, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.5730000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.5730000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.59e0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.59e0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 7.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 7.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.59e0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.59e0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 7.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 7.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 7.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 7.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 7.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: classification engineClassification label: mal100.troj.evad.winEXE@6/5@39/2
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Invoice# 77-83992-8297382 (2).exe.logJump to behavior
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeMutant created: \Sessions\1\BaseNamedObjects\Global\{e1e01d8e-d2ec-4c98-af39-dda666441e66}
        Source: Invoice# 77-83992-8297382 (2).exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: Invoice# 77-83992-8297382 (2).exeReversingLabs: Detection: 26%
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeFile read: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe 'C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe'
        Source: unknownProcess created: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess created: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: Invoice# 77-83992-8297382 (2).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: Invoice# 77-83992-8297382 (2).exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 7.2.dhcpmon.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 7.2.dhcpmon.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 7.2.dhcpmon.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeFile opened: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe\:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeFile opened: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe:Zone.Identifier read attributes | delete
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeFile opened: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe\:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeWindow / User API: threadDelayed 5388
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeWindow / User API: threadDelayed 3964
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeWindow / User API: foregroundWindowGot 1343
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeWindow / User API: foregroundWindowGot 467
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe TID: 4740Thread sleep time: -2767011611056431s >= -30000s
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe TID: 4812Thread sleep count: 138 > 30
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe TID: 5288Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe TID: 5676Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe TID: 4112Thread sleep time: -4611686018427385s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4092Thread sleep time: -1844674407370954s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6212Thread sleep count: 79 > 30
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6212Thread sleep count: 99 > 30
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5624Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6656Thread sleep time: -922337203685477s >= -30000s
        Source: dhcpmon.exe, 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmpBinary or memory string: VMware
        Source: dhcpmon.exe, 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmpBinary or memory string: vmware svga
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.621984474.0000000006F40000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: dhcpmon.exe, 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: Invoice# 77-83992-8297382 (2).exe, 00000000.00000002.243390482.0000000003FC1000.00000004.00000001.sdmp, dhcpmon.exe, 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmpBinary or memory string: tpautoconnsvc#Microsoft Hyper-V
        Source: Invoice# 77-83992-8297382 (2).exe, 00000000.00000002.243390482.0000000003FC1000.00000004.00000001.sdmp, dhcpmon.exe, 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmpBinary or memory string: cmd.txtQEMUqemu
        Source: Invoice# 77-83992-8297382 (2).exe, 00000000.00000002.243390482.0000000003FC1000.00000004.00000001.sdmp, dhcpmon.exe, 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmpBinary or memory string: vmusrvc
        Source: dhcpmon.exe, 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmpBinary or memory string: vmsrvc
        Source: dhcpmon.exe, 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmpBinary or memory string: vmtools
        Source: dhcpmon.exe, 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmpBinary or memory string: vmware sata5vmware usb pointing device-vmware vmci bus deviceCvmware virtual s scsi disk device
        Source: dhcpmon.exe, 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmpBinary or memory string: vboxservicevbox)Microsoft Virtual PC
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.621984474.0000000006F40000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.621984474.0000000006F40000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: dhcpmon.exe, 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmpBinary or memory string: virtual-vmware pointing device
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.615434525.00000000014CE000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.621984474.0000000006F40000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess token adjusted: Debug
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeMemory written: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe base: 400000 value starts with: 4D5A
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMemory written: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe base: 400000 value starts with: 4D5A
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeProcess created: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.621511799.000000000643C000.00000004.00000001.sdmpBinary or memory string: Program Manager(
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.622192424.000000000716D000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.615771156.0000000001A80000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.615771156.0000000001A80000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.618572960.0000000003491000.00000004.00000001.sdmpBinary or memory string: Program Manager0
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.616498522.0000000003123000.00000004.00000001.sdmpBinary or memory string: Program ManagerX
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.615771156.0000000001A80000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.621726909.00000000067FD000.00000004.00000001.sdmpBinary or memory string: Program Manager(pI
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeQueries volume information: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe VolumeInformation
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeQueries volume information: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe VolumeInformation
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000001.00000002.619051050.0000000004069000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.621166702.00000000059E0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.300827633.00000000044AF000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.613044676.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.244571473.0000000004A9F000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.307110365.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.243948615.0000000004909000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.616036115.0000000003021000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.243390482.0000000003FC1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.308355679.0000000003C49000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.297386701.0000000004319000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.308252762.0000000002C41000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Invoice# 77-83992-8297382 (2).exe PID: 4120, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Invoice# 77-83992-8297382 (2).exe PID: 5800, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1020, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6228, type: MEMORY
        Source: Yara matchFile source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.Invoice# 77-83992-8297382 (2).exe.59e0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.Invoice# 77-83992-8297382 (2).exe.59e0000.4.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: Invoice# 77-83992-8297382 (2).exe, 00000000.00000002.244571473.0000000004A9F000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.619051050.0000000004069000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: Invoice# 77-83992-8297382 (2).exe, 00000001.00000002.619051050.0000000004069000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 00000004.00000002.300827633.00000000044AF000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000007.00000002.307110365.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 00000007.00000002.308355679.0000000003C49000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000001.00000002.619051050.0000000004069000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.621166702.00000000059E0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.300827633.00000000044AF000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.613044676.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.244571473.0000000004A9F000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.307110365.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.243948615.0000000004909000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000001.00000002.616036115.0000000003021000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.243390482.0000000003FC1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.308355679.0000000003C49000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000004.00000002.297386701.0000000004319000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000007.00000002.308252762.0000000002C41000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Invoice# 77-83992-8297382 (2).exe PID: 4120, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: Invoice# 77-83992-8297382 (2).exe PID: 5800, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1020, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6228, type: MEMORY
        Source: Yara matchFile source: 1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.Invoice# 77-83992-8297382 (2).exe.59e0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 7.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.Invoice# 77-83992-8297382 (2).exe.59e0000.4.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1Windows Management InstrumentationValid Accounts1Valid Accounts1Masquerading2Input Capture11Security Software Discovery11Remote ServicesInput Capture11Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsAccess Token Manipulation1Valid Accounts1LSASS MemoryVirtualization/Sandbox Evasion2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Process Injection112Virtualization/Sandbox Evasion2Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDisable or Modify Tools1LSA SecretsSystem Information Discovery12SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol1Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonProcess Injection112Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsDeobfuscate/Decode Files or Information1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobHidden Files and Directories1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Obfuscated Files or Information1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
        Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Software Packing11Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        Invoice# 77-83992-8297382 (2).exe26%ReversingLabsWin32.Trojan.Bulz

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe26%ReversingLabsWin32.Trojan.Bulz

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        1.2.Invoice# 77-83992-8297382 (2).exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        7.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        1.2.Invoice# 77-83992-8297382 (2).exe.59e0000.4.unpack100%AviraTR/NanoCore.fadteDownload File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://go.microsoft.c0%Avira URL Cloudsafe
        http://ns.ado/Ident0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        1.ispnano.dns-cloud.net
        194.5.97.173
        truefalse
          unknown
          g.msn.com
          unknown
          unknownfalse
            high

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://go.microsoft.cInvoice# 77-83992-8297382 (2).exe, 00000000.00000003.233824722.0000000001326000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://ns.ado/IdentInvoice# 77-83992-8297382 (2).exe, 00000000.00000002.240339078.00000000016E9000.00000004.00000040.sdmpfalse
            • Avira URL Cloud: safe
            unknown

            Contacted IPs

            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs

            Public

            IPDomainCountryFlagASNASN NameMalicious
            194.5.97.173
            unknownNetherlands
            208476DANILENKODEfalse

            Private

            IP
            192.168.2.1

            General Information

            Joe Sandbox Version:31.0.0 Red Diamond
            Analysis ID:339193
            Start date:13.01.2021
            Start time:17:08:28
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 11m 56s
            Hypervisor based Inspection enabled:false
            Report type:light
            Sample file name:Invoice# 77-83992-8297382 (2).exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:30
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@6/5@39/2
            EGA Information:Failed
            HDC Information:
            • Successful, ratio: 0.5% (good quality ratio 0.5%)
            • Quality average: 76.8%
            • Quality standard deviation: 17.2%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 0
            • Number of non-executed functions: 0
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Found application associated with file extension: .exe
            Warnings:
            Show All
            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
            • TCP Packets have been reduced to 100
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
            • Excluded IPs from analysis (whitelisted): 104.42.151.234, 23.210.248.85, 51.104.146.109, 92.122.213.194, 92.122.213.247, 52.147.198.201, 52.255.188.83, 2.20.142.210, 2.20.142.209, 51.103.5.159, 20.54.26.129, 52.142.114.176, 51.11.168.160, 52.155.217.156
            • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, wns.notify.windows.com.akadns.net, arc.msn.com, g-msn-com-nsatc.trafficmanager.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, par02p.wns.notify.windows.com.akadns.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, db3p-ris-pf-prod-atm.trafficmanager.net, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, a767.dscg3.akamai.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, skypedataprdcolwus16.cloudapp.net
            • VT rate limit hit for: /opt/package/joesandbox/database/analysis/339193/sample/Invoice# 77-83992-8297382 (2).exe

            Simulations

            Behavior and APIs

            TimeTypeDescription
            17:09:35API Interceptor1468x Sleep call for process: Invoice# 77-83992-8297382 (2).exe modified
            17:09:38AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe

            Joe Sandbox View / Context

            IPs

            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            194.5.97.173Invoice #756-77988-23989646.exeGet hashmaliciousBrowse
              shipping order.exeGet hashmaliciousBrowse
                shipping order#.exeGet hashmaliciousBrowse

                  Domains

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  1.ispnano.dns-cloud.netshipping order.exeGet hashmaliciousBrowse
                  • 194.5.97.173
                  shipping order#.exeGet hashmaliciousBrowse
                  • 194.5.97.173

                  ASN

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  DANILENKODEPO-Scan-Documents00012910993993.exeGet hashmaliciousBrowse
                  • 194.5.97.155
                  Wjhus order 13.1.2021.exeGet hashmaliciousBrowse
                  • 194.5.98.176
                  Invoice #756-77988-23989646.exeGet hashmaliciousBrowse
                  • 194.5.97.173
                  Quotation.exeGet hashmaliciousBrowse
                  • 194.5.98.200
                  December SOA.exeGet hashmaliciousBrowse
                  • 194.5.97.66
                  IMG-001GE-0HUE48E-001012-001.exeGet hashmaliciousBrowse
                  • 194.5.97.155
                  shipping order.exeGet hashmaliciousBrowse
                  • 194.5.97.173
                  shipping order#.exeGet hashmaliciousBrowse
                  • 194.5.97.173
                  BL,IN&PL.exeGet hashmaliciousBrowse
                  • 194.5.97.206
                  New PO.exeGet hashmaliciousBrowse
                  • 194.5.98.32
                  Order Inquiry.exeGet hashmaliciousBrowse
                  • 194.5.97.235
                  IMG 01-06-2021 93899283.exeGet hashmaliciousBrowse
                  • 194.5.97.177
                  SWIFT345343445pdf.exeGet hashmaliciousBrowse
                  • 194.5.97.164
                  DHL1.exeGet hashmaliciousBrowse
                  • 194.5.98.145
                  Original BL_pdf.exeGet hashmaliciousBrowse
                  • 194.5.97.107
                  AWB & CI_pdf.exeGet hashmaliciousBrowse
                  • 194.5.97.107
                  File.exeGet hashmaliciousBrowse
                  • 194.5.98.108
                  New Avinode Plans and Prices 2021.xlsGet hashmaliciousBrowse
                  • 194.5.98.215
                  Shiping Doc BL.exeGet hashmaliciousBrowse
                  • 194.5.98.157
                  Shiping Doc BL.exeGet hashmaliciousBrowse
                  • 194.5.98.157

                  JA3 Fingerprints

                  No context

                  Dropped Files

                  No context

                  Created / dropped Files

                  C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                  Process:C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe
                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):849920
                  Entropy (8bit):5.429435248347001
                  Encrypted:false
                  SSDEEP:12288:L0Fi3dg/zDNj6udDKlNCyPhf223d9ZSn9Vb:oi3dg/PNj/KlRbZSnb
                  MD5:4C67EB7B3F4EA88E5E5487ADE487DE3F
                  SHA1:D118AE4BEEF890783251D53F3F7FE5E6C9A65A10
                  SHA-256:DB433304C3E22D8222CFE510E8548515C9DCCFC9F080F94EFC67AA11F44A6B3F
                  SHA-512:37609EA4261FE4DADF403A05014DB11DEFAE9A65CEF8C5639A56166A379B1151EE48100F6726D8160AEFAD9C49EA6A5430E17526B87A41DC2366E6C23CE4759C
                  Malicious:true
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 26%
                  Reputation:low
                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......7..............P.................. ... ....@.. .......................`............`.....................................O.... .......................@....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H...........<*......Z....E.............................................&..(.....*.s.........s.........s.........s ........*&........*".......*Vs ...(3...t.........*..(4...*..(....*N. ..........(-....*V....(E........(2....*^.~....(b........(8....*v.~....~.....(C........(<....*.....(R....*^......(F...t....o`....*..(G...*....0..d.............0.............0.............0............(!...t0..........0.......\............0.......-0.+..(!...t....&..........-...&................+?.
                  C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
                  Process:C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:modified
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Reputation:high, very likely benign file
                  Preview: [ZoneTransfer]....ZoneId=0
                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Invoice# 77-83992-8297382 (2).exe.log
                  Process:C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1451
                  Entropy (8bit):5.345862727722058
                  Encrypted:false
                  SSDEEP:24:ML9E4Ks2eE4O1lEE4UVwPKDE4KhK3VZ9pKhuE4IWUAE4KI6no84G1qE4j:MxHKXeHKlEHU0YHKhQnouHIW7HKjovGm
                  MD5:06F54CDBFEF62849AF5AE052722BD7B6
                  SHA1:FB0250AAC2057D0B5BCE4CE130891E428F28DA05
                  SHA-256:4C039B93A728B546F49C47ED8B448D40A3553CDAABB147067AEE3958133CB446
                  SHA-512:34EF5F6D5EAB0E5B11AC81F0D72FC56304291EDEEF6D19DF7145FDECAB5D342767DBBC0B4384B8DECB5741E6B85A4B431DF14FBEB5DDF2DEE103064D2895EABB
                  Malicious:true
                  Reputation:moderate, very likely benign file
                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
                  Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1451
                  Entropy (8bit):5.345862727722058
                  Encrypted:false
                  SSDEEP:24:ML9E4Ks2eE4O1lEE4UVwPKDE4KhK3VZ9pKhuE4IWUAE4KI6no84G1qE4j:MxHKXeHKlEHU0YHKhQnouHIW7HKjovGm
                  MD5:06F54CDBFEF62849AF5AE052722BD7B6
                  SHA1:FB0250AAC2057D0B5BCE4CE130891E428F28DA05
                  SHA-256:4C039B93A728B546F49C47ED8B448D40A3553CDAABB147067AEE3958133CB446
                  SHA-512:34EF5F6D5EAB0E5B11AC81F0D72FC56304291EDEEF6D19DF7145FDECAB5D342767DBBC0B4384B8DECB5741E6B85A4B431DF14FBEB5DDF2DEE103064D2895EABB
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                  C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                  Process:C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe
                  File Type:data
                  Category:dropped
                  Size (bytes):8
                  Entropy (8bit):3.0
                  Encrypted:false
                  SSDEEP:3:aYl:aQ
                  MD5:49CFF363A29F80058C2F4C57C1021A70
                  SHA1:A498CB7524C13C67F39E088417AEE9193645F6F0
                  SHA-256:04941065834332F29ECCFACA73DD5BFA47DE6B7628E23F45C50EB229893210AD
                  SHA-512:0E2FB71980BA615F463FB5FF6C6CCA2893912B0219F4B0497AA19A6D856155DAD0D3C5DC5B7808EEAE9545791C2656B633B978F583DA6E2AC2B1BCA331976CC6
                  Malicious:true
                  Reputation:low
                  Preview: .}..)..H

                  Static File Info

                  General

                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):5.429435248347001
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  • Win32 Executable (generic) a (10002005/4) 49.78%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  • DOS Executable Generic (2002/1) 0.01%
                  File name:Invoice# 77-83992-8297382 (2).exe
                  File size:849920
                  MD5:4c67eb7b3f4ea88e5e5487ade487de3f
                  SHA1:d118ae4beef890783251d53f3f7fe5e6c9a65a10
                  SHA256:db433304c3e22d8222cfe510e8548515c9dccfc9f080f94efc67aa11f44a6b3f
                  SHA512:37609ea4261fe4dadf403a05014db11defae9a65cef8c5639a56166a379b1151ee48100f6726d8160aefad9c49ea6a5430e17526b87a41dc2366e6c23ce4759c
                  SSDEEP:12288:L0Fi3dg/zDNj6udDKlNCyPhf223d9ZSn9Vb:oi3dg/PNj/KlRbZSnb
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......7..............P.................. ... ....@.. .......................`............`................................

                  File Icon

                  Icon Hash:00828e8e8686b000

                  Static PE Info

                  General

                  Entrypoint:0x4d0c1e
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                  Time Stamp:0x37DD8418 [Mon Sep 13 23:09:12 1999 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:v4.0.30319
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                  Entrypoint Preview

                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al

                  Data Directories

                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xd0bcc0x4f.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xd20000x596.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xd40000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                  Sections

                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000xcec240xcee00False0.490468041918data5.43331937316IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  .rsrc0xd20000x5960x600False0.413411458333data4.05390274957IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0xd40000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                  Resources

                  NameRVASizeTypeLanguageCountry
                  RT_VERSION0xd20a00x30cdata
                  RT_MANIFEST0xd23ac0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                  Imports

                  DLLImport
                  mscoree.dll_CorExeMain

                  Version Infos

                  DescriptionData
                  Translation0x0000 0x04b0
                  LegalCopyrightCopyright 2021
                  Assembly Version1.0.0.0
                  InternalNameStub52.exe
                  FileVersion1.0.0.0
                  CompanyName
                  LegalTrademarks
                  Comments
                  ProductNameStub52
                  ProductVersion1.0.0.0
                  FileDescriptionStub52
                  OriginalFilenameStub52.exe

                  Network Behavior

                  Network Port Distribution

                  TCP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Jan 13, 2021 17:09:36.716850042 CET4971210004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:09:36.768384933 CET1000449712194.5.97.173192.168.2.3
                  Jan 13, 2021 17:09:37.277143955 CET4971210004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:09:37.326282978 CET1000449712194.5.97.173192.168.2.3
                  Jan 13, 2021 17:09:37.839719057 CET4971210004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:09:37.889018059 CET1000449712194.5.97.173192.168.2.3
                  Jan 13, 2021 17:09:43.399245024 CET4971310004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:09:43.448784113 CET1000449713194.5.97.173192.168.2.3
                  Jan 13, 2021 17:09:44.027650118 CET4971310004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:09:44.077121973 CET1000449713194.5.97.173192.168.2.3
                  Jan 13, 2021 17:09:44.637187958 CET4971310004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:09:44.686736107 CET1000449713194.5.97.173192.168.2.3
                  Jan 13, 2021 17:09:48.800421953 CET4971710004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:09:48.849715948 CET1000449717194.5.97.173192.168.2.3
                  Jan 13, 2021 17:09:49.528851986 CET4971710004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:09:49.578217983 CET1000449717194.5.97.173192.168.2.3
                  Jan 13, 2021 17:09:50.137547016 CET4971710004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:09:50.186742067 CET1000449717194.5.97.173192.168.2.3
                  Jan 13, 2021 17:09:54.329802036 CET4972010004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:09:54.379086018 CET1000449720194.5.97.173192.168.2.3
                  Jan 13, 2021 17:09:55.028629065 CET4972010004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:09:55.077912092 CET1000449720194.5.97.173192.168.2.3
                  Jan 13, 2021 17:09:55.638024092 CET4972010004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:09:55.688035011 CET1000449720194.5.97.173192.168.2.3
                  Jan 13, 2021 17:09:59.924818993 CET4972410004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:09:59.974153042 CET1000449724194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:00.540069103 CET4972410004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:00.589448929 CET1000449724194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:01.138472080 CET4972410004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:01.254395962 CET1000449724194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:05.364154100 CET4972810004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:05.414776087 CET1000449728194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:05.928263903 CET4972810004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:05.977524996 CET1000449728194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:06.530002117 CET4972810004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:06.579221010 CET1000449728194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:10.730393887 CET4973810004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:10.779676914 CET1000449738194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:11.279241085 CET4973810004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:11.328452110 CET1000449738194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:11.983228922 CET4973810004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:12.033037901 CET1000449738194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:16.135730982 CET4974910004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:16.184935093 CET1000449749194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:16.686604023 CET4974910004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:16.735814095 CET1000449749194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:17.374187946 CET4974910004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:17.423360109 CET1000449749194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:21.603288889 CET4975010004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:21.652797937 CET1000449750194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:22.187079906 CET4975010004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:22.236682892 CET1000449750194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:22.780889988 CET4975010004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:22.833842993 CET1000449750194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:26.931889057 CET4975310004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:26.981302977 CET1000449753194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:27.484529018 CET4975310004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:27.533932924 CET1000449753194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:28.046943903 CET4975310004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:28.096316099 CET1000449753194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:32.224612951 CET4975410004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:32.274112940 CET1000449754194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:32.781811953 CET4975410004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:32.831726074 CET1000449754194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:33.344243050 CET4975410004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:33.393853903 CET1000449754194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:37.569816113 CET4975510004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:37.619103909 CET1000449755194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:38.125946045 CET4975510004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:38.175285101 CET1000449755194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:38.688491106 CET4975510004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:38.737788916 CET1000449755194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:42.835010052 CET4975610004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:42.884427071 CET1000449756194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:43.392069101 CET4975610004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:43.460846901 CET1000449756194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:43.970176935 CET4975610004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:44.019666910 CET1000449756194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:48.126225948 CET4975710004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:48.175662994 CET1000449757194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:48.689410925 CET4975710004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:48.738691092 CET1000449757194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:49.252041101 CET4975710004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:49.301299095 CET1000449757194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:53.429653883 CET4975810004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:53.479063034 CET1000449758194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:53.989485025 CET4975810004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:54.038609982 CET1000449758194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:54.549243927 CET4975810004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:54.598433971 CET1000449758194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:58.731355906 CET4975910004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:58.780493975 CET1000449759194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:59.284090042 CET4975910004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:59.333575010 CET1000449759194.5.97.173192.168.2.3
                  Jan 13, 2021 17:10:59.846481085 CET4975910004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:10:59.895761967 CET1000449759194.5.97.173192.168.2.3
                  Jan 13, 2021 17:11:04.107656002 CET4976010004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:11:04.157145023 CET1000449760194.5.97.173192.168.2.3
                  Jan 13, 2021 17:11:04.659398079 CET4976010004192.168.2.3194.5.97.173
                  Jan 13, 2021 17:11:04.709103107 CET1000449760194.5.97.173192.168.2.3

                  UDP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Jan 13, 2021 17:09:28.497873068 CET5754453192.168.2.38.8.8.8
                  Jan 13, 2021 17:09:28.545753002 CET53575448.8.8.8192.168.2.3
                  Jan 13, 2021 17:09:30.097846985 CET5598453192.168.2.38.8.8.8
                  Jan 13, 2021 17:09:30.148536921 CET53559848.8.8.8192.168.2.3
                  Jan 13, 2021 17:09:36.633502007 CET6418553192.168.2.38.8.8.8
                  Jan 13, 2021 17:09:36.703766108 CET53641858.8.8.8192.168.2.3
                  Jan 13, 2021 17:09:43.339847088 CET6511053192.168.2.38.8.8.8
                  Jan 13, 2021 17:09:43.396136045 CET53651108.8.8.8192.168.2.3
                  Jan 13, 2021 17:09:47.129807949 CET5836153192.168.2.38.8.8.8
                  Jan 13, 2021 17:09:47.187757015 CET53583618.8.8.8192.168.2.3
                  Jan 13, 2021 17:09:48.737692118 CET6349253192.168.2.38.8.8.8
                  Jan 13, 2021 17:09:48.799089909 CET53634928.8.8.8192.168.2.3
                  Jan 13, 2021 17:09:49.170738935 CET6083153192.168.2.38.8.8.8
                  Jan 13, 2021 17:09:49.221443892 CET53608318.8.8.8192.168.2.3
                  Jan 13, 2021 17:09:54.257950068 CET6010053192.168.2.38.8.8.8
                  Jan 13, 2021 17:09:54.327219009 CET53601008.8.8.8192.168.2.3
                  Jan 13, 2021 17:09:57.605323076 CET5319553192.168.2.38.8.8.8
                  Jan 13, 2021 17:09:57.665364027 CET53531958.8.8.8192.168.2.3
                  Jan 13, 2021 17:09:58.054920912 CET5014153192.168.2.38.8.8.8
                  Jan 13, 2021 17:09:58.105823994 CET53501418.8.8.8192.168.2.3
                  Jan 13, 2021 17:09:58.906404972 CET5302353192.168.2.38.8.8.8
                  Jan 13, 2021 17:09:58.954344034 CET53530238.8.8.8192.168.2.3
                  Jan 13, 2021 17:09:59.875073910 CET4956353192.168.2.38.8.8.8
                  Jan 13, 2021 17:09:59.922853947 CET53495638.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:01.104103088 CET5135253192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:01.154850006 CET53513528.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:04.195559025 CET5934953192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:04.251647949 CET53593498.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:05.037314892 CET5708453192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:05.085202932 CET53570848.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:05.305628061 CET5882353192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:05.362389088 CET53588238.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:05.939368010 CET5756853192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:05.987246990 CET53575688.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:06.753321886 CET5054053192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:06.804006100 CET53505408.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:07.158162117 CET5436653192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:07.216087103 CET53543668.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:07.363090038 CET5303453192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:07.420190096 CET53530348.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:07.619266987 CET5776253192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:07.667121887 CET53577628.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:08.528155088 CET5543553192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:08.578916073 CET53554358.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:08.703545094 CET5071353192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:08.762765884 CET53507138.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:09.439726114 CET5613253192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:09.490441084 CET53561328.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:10.292624950 CET5898753192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:10.340560913 CET53589878.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:10.680809975 CET5657953192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:10.728758097 CET53565798.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:11.144009113 CET6063353192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:11.191858053 CET53606338.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:11.978118896 CET6129253192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:12.027245045 CET53612928.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:13.100095987 CET6361953192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:13.147995949 CET53636198.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:13.912931919 CET6493853192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:13.960949898 CET53649388.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:14.609074116 CET6194653192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:14.669406891 CET53619468.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:14.829952002 CET6491053192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:14.877903938 CET53649108.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:16.075653076 CET5212353192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:16.134773016 CET53521238.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:21.541862011 CET5613053192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:21.602304935 CET53561308.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:23.246170044 CET5633853192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:23.294035912 CET53563388.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:26.182544947 CET5942053192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:26.246912003 CET53594208.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:26.873873949 CET5878453192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:26.930425882 CET53587848.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:32.166691065 CET6397853192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:32.223047972 CET53639788.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:37.515794039 CET6293853192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:37.566517115 CET53629388.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:42.785608053 CET5570853192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:42.833533049 CET53557088.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:48.068613052 CET5680353192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:48.124769926 CET53568038.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:53.342681885 CET5714553192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:53.399116993 CET53571458.8.8.8192.168.2.3
                  Jan 13, 2021 17:10:58.670852900 CET5535953192.168.2.38.8.8.8
                  Jan 13, 2021 17:10:58.729885101 CET53553598.8.8.8192.168.2.3
                  Jan 13, 2021 17:11:04.047702074 CET5830653192.168.2.38.8.8.8
                  Jan 13, 2021 17:11:04.105832100 CET53583068.8.8.8192.168.2.3
                  Jan 13, 2021 17:11:11.220237970 CET6412453192.168.2.38.8.8.8
                  Jan 13, 2021 17:11:11.268183947 CET53641248.8.8.8192.168.2.3
                  Jan 13, 2021 17:11:12.391298056 CET4936153192.168.2.38.8.8.8
                  Jan 13, 2021 17:11:12.441092014 CET53493618.8.8.8192.168.2.3
                  Jan 13, 2021 17:11:16.535574913 CET6315053192.168.2.38.8.8.8
                  Jan 13, 2021 17:11:16.591797113 CET53631508.8.8.8192.168.2.3
                  Jan 13, 2021 17:11:21.867281914 CET5327953192.168.2.38.8.8.8
                  Jan 13, 2021 17:11:21.917999029 CET53532798.8.8.8192.168.2.3
                  Jan 13, 2021 17:11:27.144418955 CET5688153192.168.2.38.8.8.8
                  Jan 13, 2021 17:11:27.200948954 CET53568818.8.8.8192.168.2.3
                  Jan 13, 2021 17:11:32.449100018 CET5364253192.168.2.38.8.8.8
                  Jan 13, 2021 17:11:32.505148888 CET53536428.8.8.8192.168.2.3
                  Jan 13, 2021 17:11:37.825323105 CET5566753192.168.2.38.8.8.8
                  Jan 13, 2021 17:11:37.884396076 CET53556678.8.8.8192.168.2.3
                  Jan 13, 2021 17:11:43.098982096 CET5483353192.168.2.38.8.8.8
                  Jan 13, 2021 17:11:43.155555964 CET53548338.8.8.8192.168.2.3
                  Jan 13, 2021 17:11:47.840683937 CET6247653192.168.2.38.8.8.8
                  Jan 13, 2021 17:11:47.889309883 CET53624768.8.8.8192.168.2.3
                  Jan 13, 2021 17:11:48.292572975 CET4970553192.168.2.38.8.8.8
                  Jan 13, 2021 17:11:48.363360882 CET53497058.8.8.8192.168.2.3
                  Jan 13, 2021 17:11:48.474570036 CET6147753192.168.2.38.8.8.8
                  Jan 13, 2021 17:11:48.533888102 CET53614778.8.8.8192.168.2.3
                  Jan 13, 2021 17:11:53.790071011 CET6163353192.168.2.38.8.8.8
                  Jan 13, 2021 17:11:53.846435070 CET53616338.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:01.194253922 CET5594953192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:01.253833055 CET53559498.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:05.255992889 CET5760153192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:05.306658983 CET53576018.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:06.062604904 CET4934253192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:06.135001898 CET53493428.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:06.609291077 CET5625353192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:06.668634892 CET53562538.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:07.035053015 CET4966753192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:07.091231108 CET53496678.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:07.822472095 CET5543953192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:07.878669977 CET53554398.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:08.999607086 CET5706953192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:09.071839094 CET53570698.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:09.929860115 CET5765953192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:09.986413956 CET53576598.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:11.465353012 CET5471753192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:11.513204098 CET53547178.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:11.913475037 CET6397553192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:11.969543934 CET53639758.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:13.596380949 CET5663953192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:13.655941963 CET53566398.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:14.919383049 CET5185653192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:14.975591898 CET53518568.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:16.517098904 CET5654653192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:16.576900005 CET53565468.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:17.317095041 CET6215253192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:17.379125118 CET53621528.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:22.594510078 CET5347053192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:22.650772095 CET53534708.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:27.921185970 CET5644653192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:27.977909088 CET53564468.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:33.220309019 CET5963153192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:33.277091980 CET53596318.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:38.455576897 CET5551553192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:38.512006044 CET53555158.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:43.689896107 CET6454753192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:43.746169090 CET53645478.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:48.924525023 CET5175953192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:48.984445095 CET53517598.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:54.175184011 CET5920753192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:54.234867096 CET53592078.8.8.8192.168.2.3
                  Jan 13, 2021 17:12:59.425617933 CET5426953192.168.2.38.8.8.8
                  Jan 13, 2021 17:12:59.484936953 CET53542698.8.8.8192.168.2.3

                  DNS Queries

                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  Jan 13, 2021 17:09:36.633502007 CET192.168.2.38.8.8.80x8d2bStandard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:09:43.339847088 CET192.168.2.38.8.8.80xb451Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:09:48.737692118 CET192.168.2.38.8.8.80x9a1dStandard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:09:54.257950068 CET192.168.2.38.8.8.80xa401Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:09:59.875073910 CET192.168.2.38.8.8.80x4d12Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:05.305628061 CET192.168.2.38.8.8.80x31b8Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:10.680809975 CET192.168.2.38.8.8.80x731bStandard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:16.075653076 CET192.168.2.38.8.8.80xdb7cStandard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:21.541862011 CET192.168.2.38.8.8.80xed52Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:26.182544947 CET192.168.2.38.8.8.80xd7bdStandard query (0)g.msn.comA (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:26.873873949 CET192.168.2.38.8.8.80xeabStandard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:32.166691065 CET192.168.2.38.8.8.80x24d2Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:37.515794039 CET192.168.2.38.8.8.80x9f9dStandard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:42.785608053 CET192.168.2.38.8.8.80xe9b8Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:48.068613052 CET192.168.2.38.8.8.80xc501Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:53.342681885 CET192.168.2.38.8.8.80xbadaStandard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:58.670852900 CET192.168.2.38.8.8.80x9107Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:04.047702074 CET192.168.2.38.8.8.80x1e09Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:11.220237970 CET192.168.2.38.8.8.80x395eStandard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:16.535574913 CET192.168.2.38.8.8.80x252cStandard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:21.867281914 CET192.168.2.38.8.8.80xb9bcStandard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:27.144418955 CET192.168.2.38.8.8.80xdab8Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:32.449100018 CET192.168.2.38.8.8.80x8966Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:37.825323105 CET192.168.2.38.8.8.80x63a5Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:43.098982096 CET192.168.2.38.8.8.80x10f8Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:48.474570036 CET192.168.2.38.8.8.80x6fc2Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:53.790071011 CET192.168.2.38.8.8.80x5cd2Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:01.194253922 CET192.168.2.38.8.8.80x25c7Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:06.609291077 CET192.168.2.38.8.8.80x264fStandard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:11.913475037 CET192.168.2.38.8.8.80x1e99Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:17.317095041 CET192.168.2.38.8.8.80x7030Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:22.594510078 CET192.168.2.38.8.8.80x8006Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:27.921185970 CET192.168.2.38.8.8.80xb879Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:33.220309019 CET192.168.2.38.8.8.80xf2bbStandard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:38.455576897 CET192.168.2.38.8.8.80x6341Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:43.689896107 CET192.168.2.38.8.8.80xc6afStandard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:48.924525023 CET192.168.2.38.8.8.80xf39fStandard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:54.175184011 CET192.168.2.38.8.8.80xf665Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:59.425617933 CET192.168.2.38.8.8.80x7a69Standard query (0)1.ispnano.dns-cloud.netA (IP address)IN (0x0001)

                  DNS Answers

                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  Jan 13, 2021 17:09:36.703766108 CET8.8.8.8192.168.2.30x8d2bNo error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:09:36.703766108 CET8.8.8.8192.168.2.30x8d2bNo error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:09:43.396136045 CET8.8.8.8192.168.2.30xb451No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:09:43.396136045 CET8.8.8.8192.168.2.30xb451No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:09:48.799089909 CET8.8.8.8192.168.2.30x9a1dNo error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:09:48.799089909 CET8.8.8.8192.168.2.30x9a1dNo error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:09:54.327219009 CET8.8.8.8192.168.2.30xa401No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:09:54.327219009 CET8.8.8.8192.168.2.30xa401No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:09:59.922853947 CET8.8.8.8192.168.2.30x4d12No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:09:59.922853947 CET8.8.8.8192.168.2.30x4d12No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:05.362389088 CET8.8.8.8192.168.2.30x31b8No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:05.362389088 CET8.8.8.8192.168.2.30x31b8No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:10.728758097 CET8.8.8.8192.168.2.30x731bNo error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:10.728758097 CET8.8.8.8192.168.2.30x731bNo error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:16.134773016 CET8.8.8.8192.168.2.30xdb7cNo error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:16.134773016 CET8.8.8.8192.168.2.30xdb7cNo error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:21.602304935 CET8.8.8.8192.168.2.30xed52No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:21.602304935 CET8.8.8.8192.168.2.30xed52No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:26.246912003 CET8.8.8.8192.168.2.30xd7bdNo error (0)g.msn.comg-msn-com-nsatc.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                  Jan 13, 2021 17:10:26.930425882 CET8.8.8.8192.168.2.30xeabNo error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:26.930425882 CET8.8.8.8192.168.2.30xeabNo error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:32.223047972 CET8.8.8.8192.168.2.30x24d2No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:32.223047972 CET8.8.8.8192.168.2.30x24d2No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:37.566517115 CET8.8.8.8192.168.2.30x9f9dNo error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:37.566517115 CET8.8.8.8192.168.2.30x9f9dNo error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:42.833533049 CET8.8.8.8192.168.2.30xe9b8No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:42.833533049 CET8.8.8.8192.168.2.30xe9b8No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:48.124769926 CET8.8.8.8192.168.2.30xc501No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:48.124769926 CET8.8.8.8192.168.2.30xc501No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:53.399116993 CET8.8.8.8192.168.2.30xbadaNo error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:53.399116993 CET8.8.8.8192.168.2.30xbadaNo error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:58.729885101 CET8.8.8.8192.168.2.30x9107No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:10:58.729885101 CET8.8.8.8192.168.2.30x9107No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:04.105832100 CET8.8.8.8192.168.2.30x1e09No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:04.105832100 CET8.8.8.8192.168.2.30x1e09No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:11.268183947 CET8.8.8.8192.168.2.30x395eNo error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:11.268183947 CET8.8.8.8192.168.2.30x395eNo error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:16.591797113 CET8.8.8.8192.168.2.30x252cNo error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:16.591797113 CET8.8.8.8192.168.2.30x252cNo error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:21.917999029 CET8.8.8.8192.168.2.30xb9bcNo error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:21.917999029 CET8.8.8.8192.168.2.30xb9bcNo error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:27.200948954 CET8.8.8.8192.168.2.30xdab8No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:27.200948954 CET8.8.8.8192.168.2.30xdab8No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:32.505148888 CET8.8.8.8192.168.2.30x8966No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:32.505148888 CET8.8.8.8192.168.2.30x8966No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:37.884396076 CET8.8.8.8192.168.2.30x63a5No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:37.884396076 CET8.8.8.8192.168.2.30x63a5No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:43.155555964 CET8.8.8.8192.168.2.30x10f8No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:43.155555964 CET8.8.8.8192.168.2.30x10f8No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:48.533888102 CET8.8.8.8192.168.2.30x6fc2No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:48.533888102 CET8.8.8.8192.168.2.30x6fc2No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:53.846435070 CET8.8.8.8192.168.2.30x5cd2No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:11:53.846435070 CET8.8.8.8192.168.2.30x5cd2No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:01.253833055 CET8.8.8.8192.168.2.30x25c7No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:01.253833055 CET8.8.8.8192.168.2.30x25c7No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:06.668634892 CET8.8.8.8192.168.2.30x264fNo error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:06.668634892 CET8.8.8.8192.168.2.30x264fNo error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:11.969543934 CET8.8.8.8192.168.2.30x1e99No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:11.969543934 CET8.8.8.8192.168.2.30x1e99No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:17.379125118 CET8.8.8.8192.168.2.30x7030No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:17.379125118 CET8.8.8.8192.168.2.30x7030No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:22.650772095 CET8.8.8.8192.168.2.30x8006No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:22.650772095 CET8.8.8.8192.168.2.30x8006No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:27.977909088 CET8.8.8.8192.168.2.30xb879No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:27.977909088 CET8.8.8.8192.168.2.30xb879No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:33.277091980 CET8.8.8.8192.168.2.30xf2bbNo error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:33.277091980 CET8.8.8.8192.168.2.30xf2bbNo error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:38.512006044 CET8.8.8.8192.168.2.30x6341No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:38.512006044 CET8.8.8.8192.168.2.30x6341No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:43.746169090 CET8.8.8.8192.168.2.30xc6afNo error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:43.746169090 CET8.8.8.8192.168.2.30xc6afNo error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:48.984445095 CET8.8.8.8192.168.2.30xf39fNo error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:48.984445095 CET8.8.8.8192.168.2.30xf39fNo error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:54.234867096 CET8.8.8.8192.168.2.30xf665No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:54.234867096 CET8.8.8.8192.168.2.30xf665No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:59.484936953 CET8.8.8.8192.168.2.30x7a69No error (0)1.ispnano.dns-cloud.net194.5.97.173A (IP address)IN (0x0001)
                  Jan 13, 2021 17:12:59.484936953 CET8.8.8.8192.168.2.30x7a69No error (0)1.ispnano.dns-cloud.net23.105.131.188A (IP address)IN (0x0001)

                  Code Manipulations

                  Statistics

                  Behavior

                  Click to jump to process

                  System Behavior

                  General

                  Start time:17:09:23
                  Start date:13/01/2021
                  Path:C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe'
                  Imagebase:0xc30000
                  File size:849920 bytes
                  MD5 hash:4C67EB7B3F4EA88E5E5487ADE487DE3F
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.244571473.0000000004A9F000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.244571473.0000000004A9F000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.244571473.0000000004A9F000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.243948615.0000000004909000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.243948615.0000000004909000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.243948615.0000000004909000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.243390482.0000000003FC1000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.243390482.0000000003FC1000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.243390482.0000000003FC1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  Reputation:low

                  General

                  Start time:17:09:29
                  Start date:13/01/2021
                  Path:C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\Desktop\Invoice# 77-83992-8297382 (2).exe
                  Imagebase:0xca0000
                  File size:849920 bytes
                  MD5 hash:4C67EB7B3F4EA88E5E5487ADE487DE3F
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.619051050.0000000004069000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.619051050.0000000004069000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.621166702.00000000059E0000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.621166702.00000000059E0000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.621166702.00000000059E0000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.613044676.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.613044676.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.613044676.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.616036115.0000000003021000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.620857692.0000000005730000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000001.00000002.620857692.0000000005730000.00000004.00000001.sdmp, Author: Florian Roth
                  Reputation:low

                  General

                  Start time:17:09:47
                  Start date:13/01/2021
                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
                  Imagebase:0x420000
                  File size:849920 bytes
                  MD5 hash:4C67EB7B3F4EA88E5E5487ADE487DE3F
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.300827633.00000000044AF000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.300827633.00000000044AF000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.300827633.00000000044AF000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.296404991.00000000039D1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.297386701.0000000004319000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.297386701.0000000004319000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.297386701.0000000004319000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  Antivirus matches:
                  • Detection: 26%, ReversingLabs
                  Reputation:low

                  General

                  Start time:17:09:52
                  Start date:13/01/2021
                  Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
                  Imagebase:0x810000
                  File size:849920 bytes
                  MD5 hash:4C67EB7B3F4EA88E5E5487ADE487DE3F
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000007.00000002.307110365.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.307110365.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.307110365.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.308355679.0000000003C49000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.308355679.0000000003C49000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.308252762.0000000002C41000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.308252762.0000000002C41000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                  Reputation:low

                  Disassembly

                  Code Analysis

                  Reset < >