Loading ...

Play interactive tourEdit tour

Analysis Report New Order_1132012_xlxs.exe

Overview

General Information

Sample Name:New Order_1132012_xlxs.exe
Analysis ID:339352
MD5:1dc30f0b34a4f0d1404dc25a1cd54f6e
SHA1:a13d3512000d9f88bc0615e63cf3fe0053eac762
SHA256:80d727cce7ca79da42e564afa636a5d023353bd7f87f9b5328038d8d3c4f071a
Tags:exeNanoCorenVpnRAT

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM_3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Binary contains a suspicious time stamp
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • New Order_1132012_xlxs.exe (PID: 4132 cmdline: 'C:\Users\user\Desktop\New Order_1132012_xlxs.exe' MD5: 1DC30F0B34A4F0D1404DC25A1CD54F6E)
    • New Order_1132012_xlxs.exe (PID: 6192 cmdline: {path} MD5: 1DC30F0B34A4F0D1404DC25A1CD54F6E)
      • schtasks.exe (PID: 6276 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp53AD.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • schtasks.exe (PID: 6328 cmdline: 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp5729.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • dhcpmon.exe (PID: 6408 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0 MD5: 1DC30F0B34A4F0D1404DC25A1CD54F6E)
    • dhcpmon.exe (PID: 6732 cmdline: {path} MD5: 1DC30F0B34A4F0D1404DC25A1CD54F6E)
  • dhcpmon.exe (PID: 6904 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 1DC30F0B34A4F0D1404DC25A1CD54F6E)
    • dhcpmon.exe (PID: 1928 cmdline: {path} MD5: 1DC30F0B34A4F0D1404DC25A1CD54F6E)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"C2: ": ["185.140.53.251"], "Version: ": "NanoCore Client, Version=1.2.2.0"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000A.00000002.275464694.0000000002401000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000015.00000002.314926958.0000000003A39000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      00000015.00000002.314926958.0000000003A39000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
      • 0x43555:$a: NanoCore
      • 0x435ae:$a: NanoCore
      • 0x435eb:$a: NanoCore
      • 0x43664:$a: NanoCore
      • 0x56d0f:$a: NanoCore
      • 0x56d24:$a: NanoCore
      • 0x56d59:$a: NanoCore
      • 0x6fcdb:$a: NanoCore
      • 0x6fcf0:$a: NanoCore
      • 0x6fd25:$a: NanoCore
      • 0x435b7:$b: ClientPlugin
      • 0x435f4:$b: ClientPlugin
      • 0x43ef2:$b: ClientPlugin
      • 0x43eff:$b: ClientPlugin
      • 0x56acb:$b: ClientPlugin
      • 0x56ae6:$b: ClientPlugin
      • 0x56b16:$b: ClientPlugin
      • 0x56d2d:$b: ClientPlugin
      • 0x56d62:$b: ClientPlugin
      • 0x6fa97:$b: ClientPlugin
      • 0x6fab2:$b: ClientPlugin
      00000009.00000002.279881959.0000000003E49000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0x148b65:$x1: NanoCore.ClientPluginHost
      • 0x17b585:$x1: NanoCore.ClientPluginHost
      • 0x148ba2:$x2: IClientNetworkHost
      • 0x17b5c2:$x2: IClientNetworkHost
      • 0x14c6d5:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      • 0x17f0f5:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      00000009.00000002.279881959.0000000003E49000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 57 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        4.2.New Order_1132012_xlxs.exe.52d0000.4.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xd9ad:$x1: NanoCore.ClientPluginHost
        • 0xd9da:$x2: IClientNetworkHost
        4.2.New Order_1132012_xlxs.exe.52d0000.4.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xd9ad:$x2: NanoCore.ClientPluginHost
        • 0xea88:$s4: PipeCreated
        • 0xd9c7:$s5: IClientLoggingHost
        4.2.New Order_1132012_xlxs.exe.52d0000.4.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          4.2.New Order_1132012_xlxs.exe.4e90000.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0xe75:$x1: NanoCore.ClientPluginHost
          • 0xe8f:$x2: IClientNetworkHost
          4.2.New Order_1132012_xlxs.exe.4e90000.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
          • 0xe75:$x2: NanoCore.ClientPluginHost
          • 0x1261:$s3: PipeExists
          • 0x1136:$s4: PipeCreated
          • 0xeb0:$s5: IClientLoggingHost
          Click to see the 19 entries

          Sigma Overview

          System Summary:

          barindex
          Sigma detected: NanoCoreShow sources
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\New Order_1132012_xlxs.exe, ProcessId: 6192, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
          Sigma detected: Scheduled temp file as task from temp locationShow sources
          Source: Process startedAuthor: Joe Security: Data: Command: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp53AD.tmp', CommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp53AD.tmp', CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: {path}, ParentImage: C:\Users\user\Desktop\New Order_1132012_xlxs.exe, ParentProcessId: 6192, ProcessCommandLine: 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp53AD.tmp', ProcessId: 6276

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: New Order_1132012_xlxs.exe.6740.14.memstrMalware Configuration Extractor: NanoCore {"C2: ": ["185.140.53.251"], "Version: ": "NanoCore Client, Version=1.2.2.0"}
          Multi AV Scanner detection for dropped fileShow sources
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 28%
          Multi AV Scanner detection for submitted fileShow sources
          Source: New Order_1132012_xlxs.exeReversingLabs: Detection: 28%
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000015.00000002.314926958.0000000003A39000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.279881959.0000000003E49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.298640803.00000000036B9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.632780032.00000000052D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.625065981.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.291660403.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.631227388.0000000003A09000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.292460519.00000000040E9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.314829401.0000000002A31000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.292360574.00000000030E1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.292801706.0000000003C39000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.291345804.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.276289789.0000000003409000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.292643698.0000000002C31000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.313795834.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.245920133.0000000003D49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: New Order_1132012_xlxs.exe PID: 6740, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: New Order_1132012_xlxs.exe PID: 6192, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1928, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6732, type: MEMORY
          Source: Yara matchFile source: 4.2.New Order_1132012_xlxs.exe.52d0000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.New Order_1132012_xlxs.exe.52d0000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPE
          Machine Learning detection for dropped fileShow sources
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
          Machine Learning detection for sampleShow sources
          Source: New Order_1132012_xlxs.exeJoe Sandbox ML: detected
          Source: 13.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 4.2.New Order_1132012_xlxs.exe.52d0000.4.unpackAvira: Label: TR/NanoCore.fadte
          Source: 21.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: 14.2.New Order_1132012_xlxs.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
          Source: New Order_1132012_xlxs.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: New Order_1132012_xlxs.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h

          Networking:

          barindex
          C2 URLs / IPs found in malware configurationShow sources
          Source: Malware configuration extractorIPs: 185.140.53.251
          Source: global trafficTCP traffic: 192.168.2.5:49722 -> 185.140.53.251:1995
          Source: Joe Sandbox ViewASN Name: DAVID_CRAIGGG DAVID_CRAIGGG
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: unknownTCP traffic detected without corresponding DNS query: 185.140.53.251
          Source: dhcpmon.exe, 0000000A.00000002.275179535.00000000008A8000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.631227388.0000000003A09000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

          E-Banking Fraud:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000015.00000002.314926958.0000000003A39000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.279881959.0000000003E49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.298640803.00000000036B9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.632780032.00000000052D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.625065981.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.291660403.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.631227388.0000000003A09000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.292460519.00000000040E9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.314829401.0000000002A31000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.292360574.00000000030E1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.292801706.0000000003C39000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.291345804.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.276289789.0000000003409000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.292643698.0000000002C31000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.313795834.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.245920133.0000000003D49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: New Order_1132012_xlxs.exe PID: 6740, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: New Order_1132012_xlxs.exe PID: 6192, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1928, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6732, type: MEMORY
          Source: Yara matchFile source: 4.2.New Order_1132012_xlxs.exe.52d0000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.New Order_1132012_xlxs.exe.52d0000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPE

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: 00000015.00000002.314926958.0000000003A39000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000009.00000002.279881959.0000000003E49000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000009.00000002.279881959.0000000003E49000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000F.00000002.298640803.00000000036B9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000F.00000002.298640803.00000000036B9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000004.00000002.632780032.00000000052D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.632470140.0000000004E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.625065981.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000004.00000002.625065981.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000E.00000002.291660403.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000E.00000002.291660403.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000004.00000002.631227388.0000000003A09000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000002.292460519.00000000040E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000015.00000002.314829401.0000000002A31000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000002.292360574.00000000030E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000E.00000002.292801706.0000000003C39000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000D.00000002.291345804.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000D.00000002.291345804.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000A.00000002.276289789.0000000003409000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0000000A.00000002.276289789.0000000003409000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0000000E.00000002.292643698.0000000002C31000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000015.00000002.313795834.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000015.00000002.313795834.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.245920133.0000000003D49000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000000.00000002.245920133.0000000003D49000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: New Order_1132012_xlxs.exe PID: 6740, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: New Order_1132012_xlxs.exe PID: 6740, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: New Order_1132012_xlxs.exe PID: 6192, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: New Order_1132012_xlxs.exe PID: 6192, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: dhcpmon.exe PID: 1928, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: dhcpmon.exe PID: 1928, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: dhcpmon.exe PID: 6732, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: Process Memory Space: dhcpmon.exe PID: 6732, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 4.2.New Order_1132012_xlxs.exe.52d0000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.New Order_1132012_xlxs.exe.4e90000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 4.2.New Order_1132012_xlxs.exe.52d0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 14.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 14.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Initial sample is a PE file and has a suspicious nameShow sources
          Source: initial sampleStatic PE information: Filename: New Order_1132012_xlxs.exe
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 0_2_0136CAE4
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 0_2_0136EEB0
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 0_2_0136EEA3
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 0_2_052D8658
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 0_2_052D0AE0
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 0_2_052D9690
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 0_2_052DA538
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 0_2_052DA548
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 0_2_052DA7E8
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 0_2_052D8648
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 0_2_052D0AD3
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 0_2_052D9680
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 4_2_0104E471
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 4_2_0104E480
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 4_2_0104BBD4
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 4_2_029A9788
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 4_2_029AF5F8
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 4_2_029A35A8
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 4_2_029AA5D0
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 4_2_029AA5F8
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 4_2_06360040
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 9_2_0148CAE4
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 9_2_0148EEAB
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 9_2_0148EEB0
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 10_2_0085CAE4
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 10_2_0085EEAA
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 10_2_0085EEB0
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 10_2_04A88658
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 10_2_04A80AE0
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 10_2_04A89690
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 10_2_04A8A538
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 10_2_04A8A548
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 10_2_04A88648
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 10_2_04A8A7E8
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 10_2_04A80AD2
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 10_2_04A89680
          Source: New Order_1132012_xlxs.exeBinary or memory string: OriginalFilename vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exe, 00000000.00000002.249375207.0000000005E00000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAssemblyReferenceEntry.exeD vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exeBinary or memory string: OriginalFilename vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exeBinary or memory string: OriginalFilename vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exeBinary or memory string: OriginalFilename vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.633834300.0000000006870000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.633553683.00000000061F0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.631227388.0000000003A09000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.631227388.0000000003A09000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.633122925.0000000005DC0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exeBinary or memory string: OriginalFilename vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exe, 00000009.00000002.283641532.0000000005380000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dll.muij% vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exe, 00000009.00000002.283632147.0000000005370000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamenlsbres.dllj% vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exe, 00000009.00000002.284265973.0000000005EE0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameAssemblyReferenceEntry.exeD vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exe, 00000009.00000002.276116621.0000000001259000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exe, 0000000E.00000002.292801706.0000000003C39000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exe, 0000000E.00000002.292801706.0000000003C39000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exe, 0000000E.00000002.292801706.0000000003C39000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exeBinary or memory string: OriginalFilename3FU.exeR vs New Order_1132012_xlxs.exe
          Source: New Order_1132012_xlxs.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: 00000015.00000002.314926958.0000000003A39000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000009.00000002.279881959.0000000003E49000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000009.00000002.279881959.0000000003E49000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000F.00000002.298640803.00000000036B9000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000F.00000002.298640803.00000000036B9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000004.00000002.632780032.00000000052D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000004.00000002.632780032.00000000052D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000004.00000002.632470140.0000000004E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000004.00000002.632470140.0000000004E90000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 00000004.00000002.625065981.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000004.00000002.625065981.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000E.00000002.291660403.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000E.00000002.291660403.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000004.00000002.631227388.0000000003A09000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000002.292460519.00000000040E9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000015.00000002.314829401.0000000002A31000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000002.292360574.00000000030E1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000E.00000002.292801706.0000000003C39000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000D.00000002.291345804.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000D.00000002.291345804.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000A.00000002.276289789.0000000003409000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0000000A.00000002.276289789.0000000003409000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0000000E.00000002.292643698.0000000002C31000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000015.00000002.313795834.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000015.00000002.313795834.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000002.245920133.0000000003D49000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000000.00000002.245920133.0000000003D49000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: New Order_1132012_xlxs.exe PID: 6740, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: New Order_1132012_xlxs.exe PID: 6740, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: New Order_1132012_xlxs.exe PID: 6192, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: New Order_1132012_xlxs.exe PID: 6192, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: dhcpmon.exe PID: 1928, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: dhcpmon.exe PID: 1928, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: dhcpmon.exe PID: 6732, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: Process Memory Space: dhcpmon.exe PID: 6732, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 4.2.New Order_1132012_xlxs.exe.52d0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.New Order_1132012_xlxs.exe.52d0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.New Order_1132012_xlxs.exe.4e90000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.New Order_1132012_xlxs.exe.4e90000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 4.2.New Order_1132012_xlxs.exe.52d0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.New Order_1132012_xlxs.exe.52d0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 14.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 14.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 14.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: New Order_1132012_xlxs.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: dhcpmon.exe.4.drStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
          Source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
          Source: 10.0.dhcpmon.exe.90000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Security.AccessControl.DirectorySecurity System.IO.DirectoryInfo::GetAccessControl()
          Source: 10.0.dhcpmon.exe.90000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 10.0.dhcpmon.exe.90000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.Security.AccessControl.FileSystemSecurity::AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 4.2.New Order_1132012_xlxs.exe.4e0000.1.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Security.AccessControl.DirectorySecurity System.IO.DirectoryInfo::GetAccessControl()
          Source: 4.2.New Order_1132012_xlxs.exe.4e0000.1.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 4.2.New Order_1132012_xlxs.exe.4e0000.1.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.Security.AccessControl.FileSystemSecurity::AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 1.2.New Order_1132012_xlxs.exe.10000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Security.AccessControl.DirectorySecurity System.IO.DirectoryInfo::GetAccessControl()
          Source: 1.2.New Order_1132012_xlxs.exe.10000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 1.2.New Order_1132012_xlxs.exe.10000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.Security.AccessControl.FileSystemSecurity::AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: New Order_1132012_xlxs.exe, ParentalControl/ParentalControl.csSecurity API names: System.Security.AccessControl.DirectorySecurity System.IO.DirectoryInfo::GetAccessControl()
          Source: New Order_1132012_xlxs.exe, ParentalControl/ParentalControl.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: New Order_1132012_xlxs.exe, ParentalControl/ParentalControl.csSecurity API names: System.Void System.Security.AccessControl.FileSystemSecurity::AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
          Source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 9.2.New Order_1132012_xlxs.exe.ac0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Security.AccessControl.DirectorySecurity System.IO.DirectoryInfo::GetAccessControl()
          Source: 9.2.New Order_1132012_xlxs.exe.ac0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 9.2.New Order_1132012_xlxs.exe.ac0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.Security.AccessControl.FileSystemSecurity::AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 9.0.New Order_1132012_xlxs.exe.ac0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Security.AccessControl.DirectorySecurity System.IO.DirectoryInfo::GetAccessControl()
          Source: 9.0.New Order_1132012_xlxs.exe.ac0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 9.0.New Order_1132012_xlxs.exe.ac0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.Security.AccessControl.FileSystemSecurity::AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 0.0.New Order_1132012_xlxs.exe.9a0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Security.AccessControl.DirectorySecurity System.IO.DirectoryInfo::GetAccessControl()
          Source: 0.0.New Order_1132012_xlxs.exe.9a0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 0.0.New Order_1132012_xlxs.exe.9a0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.Security.AccessControl.FileSystemSecurity::AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 2.0.New Order_1132012_xlxs.exe.2f0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Security.AccessControl.DirectorySecurity System.IO.DirectoryInfo::GetAccessControl()
          Source: 2.0.New Order_1132012_xlxs.exe.2f0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 2.0.New Order_1132012_xlxs.exe.2f0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.Security.AccessControl.FileSystemSecurity::AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 1.0.New Order_1132012_xlxs.exe.10000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Security.AccessControl.DirectorySecurity System.IO.DirectoryInfo::GetAccessControl()
          Source: 1.0.New Order_1132012_xlxs.exe.10000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 1.0.New Order_1132012_xlxs.exe.10000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.Security.AccessControl.FileSystemSecurity::AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: dhcpmon.exe.4.dr, ParentalControl/ParentalControl.csSecurity API names: System.Security.AccessControl.DirectorySecurity System.IO.DirectoryInfo::GetAccessControl()
          Source: dhcpmon.exe.4.dr, ParentalControl/ParentalControl.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: dhcpmon.exe.4.dr, ParentalControl/ParentalControl.csSecurity API names: System.Void System.Security.AccessControl.FileSystemSecurity::AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 4.0.New Order_1132012_xlxs.exe.4e0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Security.AccessControl.DirectorySecurity System.IO.DirectoryInfo::GetAccessControl()
          Source: 4.0.New Order_1132012_xlxs.exe.4e0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 4.0.New Order_1132012_xlxs.exe.4e0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.Security.AccessControl.FileSystemSecurity::AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 2.2.New Order_1132012_xlxs.exe.2f0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Security.AccessControl.DirectorySecurity System.IO.DirectoryInfo::GetAccessControl()
          Source: 2.2.New Order_1132012_xlxs.exe.2f0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 2.2.New Order_1132012_xlxs.exe.2f0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.Security.AccessControl.FileSystemSecurity::AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 0.2.New Order_1132012_xlxs.exe.9a0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Security.AccessControl.DirectorySecurity System.IO.DirectoryInfo::GetAccessControl()
          Source: 0.2.New Order_1132012_xlxs.exe.9a0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 0.2.New Order_1132012_xlxs.exe.9a0000.0.unpack, ParentalControl/ParentalControl.csSecurity API names: System.Void System.Security.AccessControl.FileSystemSecurity::AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: classification engineClassification label: mal100.troj.evad.winEXE@22/8@0/1
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New Order_1132012_xlxs.exe.logJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6336:120:WilError_01
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{ed3264a4-4124-4ea4-a12f-e13701477dbb}
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6296:120:WilError_01
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeFile created: C:\Users\user\AppData\Local\Temp\tmp53AD.tmpJump to behavior
          Source: New Order_1132012_xlxs.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
          Source: New Order_1132012_xlxs.exeReversingLabs: Detection: 28%
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeFile read: C:\Users\user\Desktop\New Order_1132012_xlxs.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\New Order_1132012_xlxs.exe 'C:\Users\user\Desktop\New Order_1132012_xlxs.exe'
          Source: unknownProcess created: C:\Users\user\Desktop\New Order_1132012_xlxs.exe {path}
          Source: unknownProcess created: C:\Users\user\Desktop\New Order_1132012_xlxs.exe {path}
          Source: unknownProcess created: C:\Users\user\Desktop\New Order_1132012_xlxs.exe {path}
          Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp53AD.tmp'
          Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp5729.tmp'
          Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Users\user\Desktop\New Order_1132012_xlxs.exe 'C:\Users\user\Desktop\New Order_1132012_xlxs.exe' 0
          Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
          Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
          Source: unknownProcess created: C:\Users\user\Desktop\New Order_1132012_xlxs.exe {path}
          Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
          Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess created: C:\Users\user\Desktop\New Order_1132012_xlxs.exe {path}
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess created: C:\Users\user\Desktop\New Order_1132012_xlxs.exe {path}
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess created: C:\Users\user\Desktop\New Order_1132012_xlxs.exe {path}
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp53AD.tmp'
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp5729.tmp'
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess created: C:\Users\user\Desktop\New Order_1132012_xlxs.exe {path}
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
          Source: New Order_1132012_xlxs.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: New Order_1132012_xlxs.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: New Order_1132012_xlxs.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

          Data Obfuscation:

          barindex
          .NET source code contains potential unpackerShow sources
          Source: New Order_1132012_xlxs.exe, ParentalControl/ParentalControl.cs.Net Code: wx System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.2.New Order_1132012_xlxs.exe.9a0000.0.unpack, ParentalControl/ParentalControl.cs.Net Code: wx System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 0.0.New Order_1132012_xlxs.exe.9a0000.0.unpack, ParentalControl/ParentalControl.cs.Net Code: wx System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 1.0.New Order_1132012_xlxs.exe.10000.0.unpack, ParentalControl/ParentalControl.cs.Net Code: wx System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 1.2.New Order_1132012_xlxs.exe.10000.0.unpack, ParentalControl/ParentalControl.cs.Net Code: wx System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 2.2.New Order_1132012_xlxs.exe.2f0000.0.unpack, ParentalControl/ParentalControl.cs.Net Code: wx System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 2.0.New Order_1132012_xlxs.exe.2f0000.0.unpack, ParentalControl/ParentalControl.cs.Net Code: wx System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: dhcpmon.exe.4.dr, ParentalControl/ParentalControl.cs.Net Code: wx System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.0.New Order_1132012_xlxs.exe.4e0000.0.unpack, ParentalControl/ParentalControl.cs.Net Code: wx System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.2.New Order_1132012_xlxs.exe.4e0000.1.unpack, ParentalControl/ParentalControl.cs.Net Code: wx System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 9.2.New Order_1132012_xlxs.exe.ac0000.0.unpack, ParentalControl/ParentalControl.cs.Net Code: wx System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 9.0.New Order_1132012_xlxs.exe.ac0000.0.unpack, ParentalControl/ParentalControl.cs.Net Code: wx System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 10.0.dhcpmon.exe.90000.0.unpack, ParentalControl/ParentalControl.cs.Net Code: wx System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Binary contains a suspicious time stampShow sources
          Source: initial sampleStatic PE information: 0x8DE54189 [Fri Jun 9 09:06:17 2045 UTC]
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 4_2_029AA20C push FFFFFF8Bh; iretd
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 4_2_029A69FA push esp; retf
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeCode function: 4_2_029A69F8 pushad ; retf
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 10_2_04A8F038 push 5000005Eh; retn 0004h
          Source: initial sampleStatic PE information: section name: .text entropy: 7.89221462545
          Source: initial sampleStatic PE information: section name: .text entropy: 7.89221462545
          Source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
          Source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

          Boot Survival:

          barindex
          Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
          Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp53AD.tmp'

          Hooking and other Techniques for Hiding and Protection:

          barindex
          Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeFile opened: C:\Users\user\Desktop\New Order_1132012_xlxs.exe:Zone.Identifier read attributes | delete
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion:

          barindex
          Yara detected AntiVM_3Show sources
          Source: Yara matchFile source: 0000000A.00000002.275464694.0000000002401000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.296751787.00000000026B1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.277332369.0000000002E41000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6904, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: New Order_1132012_xlxs.exe PID: 4132, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6408, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: New Order_1132012_xlxs.exe PID: 6396, type: MEMORY
          Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
          Source: New Order_1132012_xlxs.exe, 00000000.00000002.245196991.0000000002D83000.00000004.00000001.sdmp, New Order_1132012_xlxs.exe, 00000009.00000002.277711497.0000000002EB9000.00000004.00000001.sdmp, dhcpmon.exe, 0000000A.00000002.275464694.0000000002401000.00000004.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.297020002.0000000002729000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: New Order_1132012_xlxs.exe, 00000000.00000002.245196991.0000000002D83000.00000004.00000001.sdmp, New Order_1132012_xlxs.exe, 00000009.00000002.277711497.0000000002EB9000.00000004.00000001.sdmp, dhcpmon.exe, 0000000A.00000002.275464694.0000000002401000.00000004.00000001.sdmp, dhcpmon.exe, 0000000F.00000002.297020002.0000000002729000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeWindow / User API: threadDelayed 6671
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeWindow / User API: threadDelayed 2671
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeWindow / User API: foregroundWindowGot 1292
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeWindow / User API: foregroundWindowGot 446
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exe TID: 2252Thread sleep time: -31500s >= -30000s
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exe TID: 6036Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exe TID: 6380Thread sleep time: -5534023222112862s >= -30000s
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exe TID: 6400Thread sleep time: -31500s >= -30000s
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exe TID: 6428Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6412Thread sleep time: -31500s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6452Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6816Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exe TID: 6852Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6908Thread sleep time: -31500s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6980Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 6180Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: dhcpmon.exe, 0000000F.00000002.297020002.0000000002729000.00000004.00000001.sdmpBinary or memory string: VMware
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.633834300.0000000006870000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
          Source: dhcpmon.exe, 0000000F.00000002.297020002.0000000002729000.00000004.00000001.sdmpBinary or memory string: vmware
          Source: dhcpmon.exe, 0000000F.00000002.297020002.0000000002729000.00000004.00000001.sdmpBinary or memory string: l%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: dhcpmon.exe, 0000000F.00000002.297020002.0000000002729000.00000004.00000001.sdmpBinary or memory string: VMWARE
          Source: dhcpmon.exe, 0000000F.00000002.297020002.0000000002729000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.633834300.0000000006870000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.633834300.0000000006870000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
          Source: dhcpmon.exe, 0000000F.00000002.297020002.0000000002729000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
          Source: dhcpmon.exe, 0000000F.00000002.297020002.0000000002729000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
          Source: dhcpmon.exe, 0000000F.00000002.297020002.0000000002729000.00000004.00000001.sdmpBinary or memory string: VMware
          Source: dhcpmon.exe, 0000000F.00000002.297020002.0000000002729000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: dhcpmon.exe, 0000000F.00000002.297020002.0000000002729000.00000004.00000001.sdmpBinary or memory string: l"SOFTWARE\VMware, Inc.\VMware Tools
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.627189646.0000000000BC0000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.633834300.0000000006870000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess information queried: ProcessInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess token adjusted: Debug
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeMemory allocated: page read and write | page guard
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess created: C:\Users\user\Desktop\New Order_1132012_xlxs.exe {path}
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess created: C:\Users\user\Desktop\New Order_1132012_xlxs.exe {path}
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess created: C:\Users\user\Desktop\New Order_1132012_xlxs.exe {path}
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp53AD.tmp'
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp5729.tmp'
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeProcess created: C:\Users\user\Desktop\New Order_1132012_xlxs.exe {path}
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe {path}
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.632998632.0000000005AFE000.00000004.00000010.sdmpBinary or memory string: Program Manager
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.627949321.0000000001400000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.627949321.0000000001400000.00000002.00000001.sdmpBinary or memory string: Progman
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.627949321.0000000001400000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.630797435.0000000002D9B000.00000004.00000001.sdmpBinary or memory string: Program Managerx
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.627949321.0000000001400000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.627949321.0000000001400000.00000002.00000001.sdmpBinary or memory string: Progmanlock
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.633987483.0000000006A9E000.00000004.00000001.sdmpBinary or memory string: Program Manager ]
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.633600535.000000000633E000.00000004.00000001.sdmpBinary or memory string: Program Manager
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Users\user\Desktop\New Order_1132012_xlxs.exe VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Users\user\Desktop\New Order_1132012_xlxs.exe VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Users\user\Desktop\New Order_1132012_xlxs.exe VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Users\user\Desktop\New Order_1132012_xlxs.exe VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\New Order_1132012_xlxs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

          Stealing of Sensitive Information:

          barindex
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000015.00000002.314926958.0000000003A39000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.279881959.0000000003E49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.298640803.00000000036B9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.632780032.00000000052D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.625065981.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.291660403.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.631227388.0000000003A09000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.292460519.00000000040E9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.314829401.0000000002A31000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.292360574.00000000030E1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.292801706.0000000003C39000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.291345804.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.276289789.0000000003409000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.292643698.0000000002C31000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.313795834.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.245920133.0000000003D49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: New Order_1132012_xlxs.exe PID: 6740, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: New Order_1132012_xlxs.exe PID: 6192, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1928, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6732, type: MEMORY
          Source: Yara matchFile source: 4.2.New Order_1132012_xlxs.exe.52d0000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.New Order_1132012_xlxs.exe.52d0000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPE

          Remote Access Functionality:

          barindex
          Detected Nanocore RatShow sources
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.625065981.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: New Order_1132012_xlxs.exe, 00000004.00000002.631227388.0000000003A09000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: dhcpmon.exe, 0000000D.00000002.292460519.00000000040E9000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: dhcpmon.exe, 0000000D.00000002.292460519.00000000040E9000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: New Order_1132012_xlxs.exe, 0000000E.00000002.291660403.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: New Order_1132012_xlxs.exe, 0000000E.00000002.292801706.0000000003C39000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: dhcpmon.exe, 00000015.00000002.314926958.0000000003A39000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: dhcpmon.exe, 00000015.00000002.314926958.0000000003A39000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Yara detected Nanocore RATShow sources
          Source: Yara matchFile source: 00000015.00000002.314926958.0000000003A39000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.279881959.0000000003E49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000F.00000002.298640803.00000000036B9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.632780032.00000000052D0000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.625065981.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.291660403.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.631227388.0000000003A09000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.292460519.00000000040E9000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.314829401.0000000002A31000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.292360574.00000000030E1000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.292801706.0000000003C39000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000D.00000002.291345804.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.276289789.0000000003409000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000E.00000002.292643698.0000000002C31000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000015.00000002.313795834.0000000000402000.00000040.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.245920133.0000000003D49000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: New Order_1132012_xlxs.exe PID: 6740, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: New Order_1132012_xlxs.exe PID: 6192, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 1928, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 6732, type: MEMORY
          Source: Yara matchFile source: 4.2.New Order_1132012_xlxs.exe.52d0000.4.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 21.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 13.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.New Order_1132012_xlxs.exe.52d0000.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 14.2.New Order_1132012_xlxs.exe.400000.0.unpack, type: UNPACKEDPE

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection12Masquerading2Input Capture21Security Software Discovery21Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Virtualization/Sandbox Evasion2LSASS MemoryVirtualization/Sandbox Evasion2Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol1SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsSystem Information Discovery12SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information3DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing13Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Timestomp1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 339352 Sample: New Order_1132012_xlxs.exe Startdate: 13/01/2021 Architecture: WINDOWS Score: 100 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 Multi AV Scanner detection for dropped file 2->56 58 14 other signatures 2->58 8 New Order_1132012_xlxs.exe 3 2->8         started        11 New Order_1132012_xlxs.exe 2 2->11         started        13 dhcpmon.exe 2 2->13         started        15 dhcpmon.exe 3 2->15         started        process3 file4 48 C:\Users\...48ew Order_1132012_xlxs.exe.log, ASCII 8->48 dropped 17 New Order_1132012_xlxs.exe 1 12 8->17         started        22 New Order_1132012_xlxs.exe 8->22         started        24 New Order_1132012_xlxs.exe 8->24         started        26 New Order_1132012_xlxs.exe 2 11->26         started        28 dhcpmon.exe 13->28         started        30 dhcpmon.exe 2 15->30         started        process5 dnsIp6 50 185.140.53.251, 1995, 49722, 49725 DAVID_CRAIGGG Sweden 17->50 40 C:\Program Files (x86)\...\dhcpmon.exe, PE32 17->40 dropped 42 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 17->42 dropped 44 C:\Users\user\AppData\Local\...\tmp53AD.tmp, XML 17->44 dropped 46 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 17->46 dropped 60 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->60 32 schtasks.exe 1 17->32         started        34 schtasks.exe 1 17->34         started        file7 signatures8 process9 process10 36 conhost.exe 32->36         started        38 conhost.exe 34->38         started       

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          New Order_1132012_xlxs.exe28%ReversingLabsWin32.Trojan.Wacatac
          New Order_1132012_xlxs.exe100%Joe Sandbox ML

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe28%ReversingLabsWin32.Trojan.Wacatac

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          13.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          4.2.New Order_1132012_xlxs.exe.52d0000.4.unpack100%AviraTR/NanoCore.fadteDownload File
          21.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          4.2.New Order_1132012_xlxs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
          14.2.New Order_1132012_xlxs.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

          Domains

          No Antivirus matches

          URLs

          No Antivirus matches

          Domains and IPs

          Contacted Domains

          No contacted domains info

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious
          185.140.53.251
          unknownSweden
          209623DAVID_CRAIGGGtrue

          General Information

          Joe Sandbox Version:31.0.0 Red Diamond
          Analysis ID:339352
          Start date:13.01.2021
          Start time:21:29:38
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 14m 26s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:New Order_1132012_xlxs.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:40
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@22/8@0/1
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 0.5% (good quality ratio 0.5%)
          • Quality average: 80.9%
          • Quality standard deviation: 31.5%
          HCA Information:
          • Successful, ratio: 99%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .exe
          Warnings:
          Show All
          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
          • TCP Packets have been reduced to 100
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
          • Report creation exceeded maximum time and may have missing disassembly code information.
          • Report size exceeded maximum capacity and may have missing behavior information.
          • VT rate limit hit for: /opt/package/joesandbox/database/analysis/339352/sample/New Order_1132012_xlxs.exe

          Simulations

          Behavior and APIs

          TimeTypeDescription
          21:30:31API Interceptor1452x Sleep call for process: New Order_1132012_xlxs.exe modified
          21:30:40Task SchedulerRun new task: DHCP Monitor path: "C:\Users\user\Desktop\New Order_1132012_xlxs.exe" s>$(Arg0)
          21:30:40Task SchedulerRun new task: DHCP Monitor Task path: "C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe" s>$(Arg0)
          21:30:41AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          21:30:42API Interceptor2x Sleep call for process: dhcpmon.exe modified

          Joe Sandbox View / Context

          IPs

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          185.140.53.251URGENT #RFQ 102720.exeGet hashmaliciousBrowse
            URGENT #RFQ.exeGet hashmaliciousBrowse

              Domains

              No context

              ASN

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              DAVID_CRAIGGGCONTRACT_87908.exeGet hashmaliciousBrowse
              • 91.193.75.182
              Geno_Quotation,pdf.exeGet hashmaliciousBrowse
              • 185.140.53.135
              Quote_45893216_33661100.pdf.exeGet hashmaliciousBrowse
              • 91.193.75.185
              DHL Delivery Shipping, PDF.exeGet hashmaliciousBrowse
              • 185.244.30.18
              Proof of Payment.exeGet hashmaliciousBrowse
              • 185.140.53.183
              INVOICE-0966542R.exeGet hashmaliciousBrowse
              • 185.165.153.116
              Payment notification.exeGet hashmaliciousBrowse
              • 185.140.53.146
              xNrobnGMNI.exeGet hashmaliciousBrowse
              • 91.193.75.94
              E8Jkw96qFU.exeGet hashmaliciousBrowse
              • 185.140.53.149
              PAYMENT-REFUND-DOCUMENTS-00J-0S3.exeGet hashmaliciousBrowse
              • 185.140.53.185
              Scan-Documents0012HDU5063GD7G.exeGet hashmaliciousBrowse
              • 185.140.53.185
              PO20002106.exeGet hashmaliciousBrowse
              • 185.140.53.135
              Shipping Document PL&BL003534,pdf.exeGet hashmaliciousBrowse
              • 185.244.30.19
              Shipping Document PLBL003534.xlsGet hashmaliciousBrowse
              • 185.244.30.19
              DHL1.exeGet hashmaliciousBrowse
              • 185.140.53.221
              New Order.exeGet hashmaliciousBrowse
              • 185.140.53.227
              988119028872673623l.exeGet hashmaliciousBrowse
              • 185.140.53.163
              SecuriteInfo.com.Fareit-FZO54A4BE7037EC.exeGet hashmaliciousBrowse
              • 185.140.53.149
              QUOTATION2021_RFQ#38787_A_Bich_Thien_Trading_Co_Ltd.exeGet hashmaliciousBrowse
              • 185.140.53.211
              NEWQUOTATION_RFQ#38787_A_Bich_Thien_Trading_Co_Ltd.exeGet hashmaliciousBrowse
              • 185.140.53.211

              JA3 Fingerprints

              No context

              Dropped Files

              No context

              Created / dropped Files

              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              Process:C:\Users\user\Desktop\New Order_1132012_xlxs.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):639488
              Entropy (8bit):7.8841839406073335
              Encrypted:false
              SSDEEP:12288:lS8VEI79a0l4Erl2+2EMlJSZ4C2UiVkEpW1S4W:vVNxjuEd5py9pw
              MD5:1DC30F0B34A4F0D1404DC25A1CD54F6E
              SHA1:A13D3512000D9F88BC0615E63CF3FE0053EAC762
              SHA-256:80D727CCE7CA79DA42E564AFA636A5D023353BD7F87F9B5328038D8D3C4F071A
              SHA-512:FC0E518768A66BAC569F3F1CCAC286B3440E5E3486451402F4C7F9D036F114B89576956B8E5A31DAEAC26B5BD0F9BBC6D8F9C2DDFFB5BD77EA7A33660E1626C7
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 28%
              Reputation:low
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....A...............0.................. ........@.. ....................... ............@.................................d...O...................................H................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H...........T.......K...8K...............................................0..B........s.........(.......(.....(.......(....o.......s....(.......(.....*".(.....*..0..............r...p..(......9.........s........s ......8........a...%..=.o!.........o"...ri..p(#.......,q.....o"....(#.......,Z.+:....a...%..=.o!.........o"...r{..p(#.......,.......($...&...o%...%.r...po&..........-......o%...%........:L......&......o'........&.......+...*.......,......................0...........s(.
              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
              Process:C:\Users\user\Desktop\New Order_1132012_xlxs.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview: [ZoneTransfer]....ZoneId=0
              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New Order_1132012_xlxs.exe.log
              Process:C:\Users\user\Desktop\New Order_1132012_xlxs.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1216
              Entropy (8bit):5.355304211458859
              Encrypted:false
              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
              MD5:FED34146BF2F2FA59DCF8702FCC8232E
              SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
              SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
              SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
              Malicious:true
              Reputation:high, very likely benign file
              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1216
              Entropy (8bit):5.355304211458859
              Encrypted:false
              SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
              MD5:FED34146BF2F2FA59DCF8702FCC8232E
              SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
              SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
              SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
              Malicious:false
              Reputation:high, very likely benign file
              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
              C:\Users\user\AppData\Local\Temp\tmp53AD.tmp
              Process:C:\Users\user\Desktop\New Order_1132012_xlxs.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1313
              Entropy (8bit):5.119062090819913
              Encrypted:false
              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0PB3xtn:cbk4oL600QydbQxIYODOLedq3SB3j
              MD5:AA5CEF070BB24DB9CDC1F900F88844F8
              SHA1:428035BD5B8FB743962530739FB29AB78F2DD6AC
              SHA-256:4D6B3200CF59C3AE262E1397B549AC370A01DC7C6C1EA26994CBFB445CC4173C
              SHA-512:4DA38C4D44123429FB6F503CBB3FA11C079AAA38192BBDBCD4678A56D01A2EFF71E6DF7F17A006CB436278E52D097B8B6E411BEEDBB5451EC42863EB41A01A1A
              Malicious:true
              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
              C:\Users\user\AppData\Local\Temp\tmp5729.tmp
              Process:C:\Users\user\Desktop\New Order_1132012_xlxs.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):1310
              Entropy (8bit):5.109425792877704
              Encrypted:false
              SSDEEP:24:2dH4+S/4oL600QlMhEMjn5pwjVLUYODOLG9RJh7h8gK0R3xtn:cbk4oL600QydbQxIYODOLedq3S3j
              MD5:5C2F41CFC6F988C859DA7D727AC2B62A
              SHA1:68999C85FC7E37BAB9216E0099836D40D4545C1C
              SHA-256:98B6E66B6C2173B9B91FC97FE51805340EFDE978B695453742EBAB631018398B
              SHA-512:B5DA5DA378D038AFBF8A7738E47921ED39F9B726E2CAA2993D915D9291A3322F94EFE8CCA6E7AD678A670DB19926B22B20E5028460FCC89CEA7F6635E7557334
              Malicious:false
              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo />.. <Triggers />.. <Principals>.. <Principal id="Author">.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>Parallel</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>false</StopIfGoingOnBatteries>.. <AllowHardTerminate>true</AllowHardTerminate>.. <StartWhenAvailable>false</StartWhenAvailable>.. <RunOnlyIfNetworkAvailable>false</RunOnlyIfNetworkAvailable>.. <IdleSettings>.. <StopOnIdleEnd>false</StopOnIdleEnd>.. <RestartOnIdle>false</RestartOnIdle>.. </IdleSettings>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Hidden>false</Hidden>.. <RunOnlyIfIdle>false</RunOnlyIfIdle>.. <Wak
              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
              Process:C:\Users\user\Desktop\New Order_1132012_xlxs.exe
              File Type:ISO-8859 text, with NEL line terminators
              Category:dropped
              Size (bytes):8
              Entropy (8bit):3.0
              Encrypted:false
              SSDEEP:3:AvP:AvP
              MD5:AE5C54A5CD39B0545B4A937B7A47F40D
              SHA1:485FC132EBC3F5B7FF7D1504524D890B30C5A438
              SHA-256:59E03BF0AFB302A7DCF3B3DDED6C201B97DDC2833B293197B3AEF7DD5AD569B7
              SHA-512:08232E4BBFE788E4223FF1CC955173C6132EF5D32FEF313C1AD379112A7C90E83DA76124A52956A0BE587BB2BCF060E5784AF9BC6AA7B5D31362F60962859DC6
              Malicious:true
              Preview: ...M..H
              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\task.dat
              Process:C:\Users\user\Desktop\New Order_1132012_xlxs.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):50
              Entropy (8bit):4.496174630069642
              Encrypted:false
              SSDEEP:3:oNUWJRWrgA5S4An:oNNJACn
              MD5:B98B3AAB737B53E93C07EC515EDC5E0A
              SHA1:A8E962EF9CF7566544A114FF8CABA54B28CEF688
              SHA-256:B45E04ED07900E534B6F49F3A5DD28660A2A4B4FC778E88E05EB8AC3F3CF726B
              SHA-512:D0CC3AAEE9843B963FF6C816335BEF56A05551E944020FA8B5D0B6F4B136039F9F90D88F26756A716693D39EFBDEE5B12ACAED750C5CE98790FF259980309BA5
              Malicious:false
              Preview: C:\Users\user\Desktop\New Order_1132012_xlxs.exe

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):7.8841839406073335
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              • Win32 Executable (generic) a (10002005/4) 49.75%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Windows Screen Saver (13104/52) 0.07%
              • Generic Win/DOS Executable (2004/3) 0.01%
              File name:New Order_1132012_xlxs.exe
              File size:639488
              MD5:1dc30f0b34a4f0d1404dc25a1cd54f6e
              SHA1:a13d3512000d9f88bc0615e63cf3fe0053eac762
              SHA256:80d727cce7ca79da42e564afa636a5d023353bd7f87f9b5328038d8d3c4f071a
              SHA512:fc0e518768a66bac569f3f1ccac286b3440e5e3486451402f4c7f9d036f114b89576956b8e5a31daeac26b5bd0f9bbc6d8f9c2ddffb5bd77ea7a33660e1626c7
              SSDEEP:12288:lS8VEI79a0l4Erl2+2EMlJSZ4C2UiVkEpW1S4W:vVNxjuEd5py9pw
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....A................0.................. ........@.. ....................... ............@................................

              File Icon

              Icon Hash:00828e8e8686b000

              Static PE Info

              General

              Entrypoint:0x49d6b6
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x8DE54189 [Fri Jun 9 09:06:17 2045 UTC]
              TLS Callbacks:
              CLR (.Net) Version:v4.0.30319
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

              Entrypoint Preview

              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x9d6640x4f.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x9e0000x5d4.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0xa00000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x9d6480x1c.text
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000x9b6bc0x9b800False0.918877800945data7.89221462545IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .rsrc0x9e0000x5d40x600False0.427734375data4.15154877822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0xa00000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_VERSION0x9e0900x344data
              RT_MANIFEST0x9e3e40x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

              Imports

              DLLImport
              mscoree.dll_CorExeMain

              Version Infos

              DescriptionData
              Translation0x0000 0x04b0
              LegalCopyrightCopyright 2019
              Assembly Version1.0.0.0
              InternalName3.exe
              FileVersion1.0.0.0
              CompanyName
              LegalTrademarks
              Comments
              ProductNameMultiUserParentalControl
              ProductVersion1.0.0.0
              FileDescriptionMultiUserParentalControl
              OriginalFilename3.exe

              Network Behavior

              Network Port Distribution

              TCP Packets

              TimestampSource PortDest PortSource IPDest IP
              Jan 13, 2021 21:30:40.972897053 CET497221995192.168.2.5185.140.53.251
              Jan 13, 2021 21:30:41.021497965 CET199549722185.140.53.251192.168.2.5
              Jan 13, 2021 21:30:41.642374992 CET497221995192.168.2.5185.140.53.251
              Jan 13, 2021 21:30:41.691227913 CET199549722185.140.53.251192.168.2.5
              Jan 13, 2021 21:30:42.252154112 CET497221995192.168.2.5185.140.53.251
              Jan 13, 2021 21:30:42.300782919 CET199549722185.140.53.251192.168.2.5
              Jan 13, 2021 21:30:49.396212101 CET497251995192.168.2.5185.140.53.251
              Jan 13, 2021 21:30:49.444942951 CET199549725185.140.53.251192.168.2.5
              Jan 13, 2021 21:30:49.955552101 CET497251995192.168.2.5185.140.53.251
              Jan 13, 2021 21:30:50.004475117 CET199549725185.140.53.251192.168.2.5
              Jan 13, 2021 21:30:50.643218994 CET497251995192.168.2.5185.140.53.251
              Jan 13, 2021 21:30:50.691741943 CET199549725185.140.53.251192.168.2.5
              Jan 13, 2021 21:30:54.707335949 CET497271995192.168.2.5185.140.53.251
              Jan 13, 2021 21:30:54.755932093 CET199549727185.140.53.251192.168.2.5
              Jan 13, 2021 21:30:55.455965042 CET497271995192.168.2.5185.140.53.251
              Jan 13, 2021 21:30:55.504695892 CET199549727185.140.53.251192.168.2.5
              Jan 13, 2021 21:30:56.147284031 CET497271995192.168.2.5185.140.53.251
              Jan 13, 2021 21:30:56.196141958 CET199549727185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:00.208256006 CET497301995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:00.257067919 CET199549730185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:00.894015074 CET497301995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:00.942729950 CET199549730185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:01.487787962 CET497301995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:01.537045002 CET199549730185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:05.558157921 CET497311995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:05.606755018 CET199549731185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:06.285069942 CET497311995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:06.333616972 CET199549731185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:06.894527912 CET497311995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:06.944602966 CET199549731185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:10.958761930 CET497331995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:11.007925987 CET199549733185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:11.598006964 CET497331995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:11.646727085 CET199549733185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:12.191817999 CET497331995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:12.241919994 CET199549733185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:16.256026030 CET497361995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:16.304826021 CET199549736185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:16.817116976 CET497361995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:16.865966082 CET199549736185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:17.379668951 CET497361995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:17.428304911 CET199549736185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:21.444639921 CET497371995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:21.493226051 CET199549737185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:22.020674944 CET497371995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:22.073520899 CET199549737185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:22.614516020 CET497371995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:22.662916899 CET199549737185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:26.733237028 CET497431995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:26.781857014 CET199549743185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:27.427428961 CET497431995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:27.475924969 CET199549743185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:28.021718979 CET497431995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:28.070516109 CET199549743185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:32.320411921 CET497441995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:32.369371891 CET199549744185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:32.974709034 CET497441995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:33.023679972 CET199549744185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:33.662285089 CET497441995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:33.710856915 CET199549744185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:37.727041006 CET497451995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:37.775808096 CET199549745185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:38.288775921 CET497451995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:38.337404966 CET199549745185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:38.850286007 CET497451995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:38.899238110 CET199549745185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:42.915177107 CET497471995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:42.964174986 CET199549747185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:43.475689888 CET497471995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:43.524322033 CET199549747185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:44.038144112 CET497471995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:44.087078094 CET199549747185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:48.103312969 CET497481995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:48.151956081 CET199549748185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:48.663528919 CET497481995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:48.712162018 CET199549748185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:49.226151943 CET497481995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:49.274797916 CET199549748185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:53.290574074 CET497491995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:53.340678930 CET199549749185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:53.851526976 CET497491995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:53.902235985 CET199549749185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:54.413999081 CET497491995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:54.462584972 CET199549749185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:58.478410959 CET497501995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:58.526983976 CET199549750185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:59.039422035 CET497501995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:59.088226080 CET199549750185.140.53.251192.168.2.5
              Jan 13, 2021 21:31:59.617542982 CET497501995192.168.2.5185.140.53.251
              Jan 13, 2021 21:31:59.666513920 CET199549750185.140.53.251192.168.2.5
              Jan 13, 2021 21:32:03.682140112 CET497511995192.168.2.5185.140.53.251
              Jan 13, 2021 21:32:03.731821060 CET199549751185.140.53.251192.168.2.5
              Jan 13, 2021 21:32:04.242986917 CET497511995192.168.2.5185.140.53.251
              Jan 13, 2021 21:32:04.291734934 CET199549751185.140.53.251192.168.2.5
              Jan 13, 2021 21:32:04.805511951 CET497511995192.168.2.5185.140.53.251
              Jan 13, 2021 21:32:04.854181051 CET199549751185.140.53.251192.168.2.5
              Jan 13, 2021 21:32:08.870229006 CET497521995192.168.2.5185.140.53.251
              Jan 13, 2021 21:32:08.918982029 CET199549752185.140.53.251192.168.2.5
              Jan 13, 2021 21:32:09.430872917 CET497521995192.168.2.5185.140.53.251
              Jan 13, 2021 21:32:09.479660988 CET199549752185.140.53.251192.168.2.5

              Code Manipulations

              Statistics

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:21:30:30
              Start date:13/01/2021
              Path:C:\Users\user\Desktop\New Order_1132012_xlxs.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\New Order_1132012_xlxs.exe'
              Imagebase:0x9a0000
              File size:639488 bytes
              MD5 hash:1DC30F0B34A4F0D1404DC25A1CD54F6E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.245920133.0000000003D49000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.245920133.0000000003D49000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.245920133.0000000003D49000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low

              General

              Start time:21:30:34
              Start date:13/01/2021
              Path:C:\Users\user\Desktop\New Order_1132012_xlxs.exe
              Wow64 process (32bit):false
              Commandline:{path}
              Imagebase:0x10000
              File size:639488 bytes
              MD5 hash:1DC30F0B34A4F0D1404DC25A1CD54F6E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low

              General

              Start time:21:30:34
              Start date:13/01/2021
              Path:C:\Users\user\Desktop\New Order_1132012_xlxs.exe
              Wow64 process (32bit):false
              Commandline:{path}
              Imagebase:0x2f0000
              File size:639488 bytes
              MD5 hash:1DC30F0B34A4F0D1404DC25A1CD54F6E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low

              General

              Start time:21:30:35
              Start date:13/01/2021
              Path:C:\Users\user\Desktop\New Order_1132012_xlxs.exe
              Wow64 process (32bit):true
              Commandline:{path}
              Imagebase:0x4e0000
              File size:639488 bytes
              MD5 hash:1DC30F0B34A4F0D1404DC25A1CD54F6E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.632780032.00000000052D0000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.632780032.00000000052D0000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.632780032.00000000052D0000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.632470140.0000000004E90000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000004.00000002.632470140.0000000004E90000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000004.00000002.625065981.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.625065981.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.625065981.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000004.00000002.631227388.0000000003A09000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000004.00000002.631227388.0000000003A09000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low

              General

              Start time:21:30:37
              Start date:13/01/2021
              Path:C:\Windows\SysWOW64\schtasks.exe
              Wow64 process (32bit):true
              Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor' /xml 'C:\Users\user\AppData\Local\Temp\tmp53AD.tmp'
              Imagebase:0x9c0000
              File size:185856 bytes
              MD5 hash:15FF7D8324231381BAD48A052F85DF04
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:21:30:38
              Start date:13/01/2021
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7ecfc0000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:21:30:38
              Start date:13/01/2021
              Path:C:\Windows\SysWOW64\schtasks.exe
              Wow64 process (32bit):true
              Commandline:'schtasks.exe' /create /f /tn 'DHCP Monitor Task' /xml 'C:\Users\user\AppData\Local\Temp\tmp5729.tmp'
              Imagebase:0x9c0000
              File size:185856 bytes
              MD5 hash:15FF7D8324231381BAD48A052F85DF04
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:21:30:38
              Start date:13/01/2021
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff797770000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:21:30:40
              Start date:13/01/2021
              Path:C:\Users\user\Desktop\New Order_1132012_xlxs.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\New Order_1132012_xlxs.exe' 0
              Imagebase:0xac0000
              File size:639488 bytes
              MD5 hash:1DC30F0B34A4F0D1404DC25A1CD54F6E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000009.00000002.279881959.0000000003E49000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000009.00000002.279881959.0000000003E49000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000009.00000002.279881959.0000000003E49000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000009.00000002.277332369.0000000002E41000.00000004.00000001.sdmp, Author: Joe Security
              Reputation:low

              General

              Start time:21:30:40
              Start date:13/01/2021
              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              Wow64 process (32bit):true
              Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' 0
              Imagebase:0x90000
              File size:639488 bytes
              MD5 hash:1DC30F0B34A4F0D1404DC25A1CD54F6E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000A.00000002.275464694.0000000002401000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000A.00000002.276289789.0000000003409000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000A.00000002.276289789.0000000003409000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000A.00000002.276289789.0000000003409000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              • Detection: 28%, ReversingLabs
              Reputation:low

              General

              Start time:21:30:49
              Start date:13/01/2021
              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              Wow64 process (32bit):true
              Commandline:{path}
              Imagebase:0xd60000
              File size:639488 bytes
              MD5 hash:1DC30F0B34A4F0D1404DC25A1CD54F6E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.292460519.00000000040E9000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.292460519.00000000040E9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.292360574.00000000030E1000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.292360574.00000000030E1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000D.00000002.291345804.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000D.00000002.291345804.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000D.00000002.291345804.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low

              General

              Start time:21:30:49
              Start date:13/01/2021
              Path:C:\Users\user\Desktop\New Order_1132012_xlxs.exe
              Wow64 process (32bit):true
              Commandline:{path}
              Imagebase:0x850000
              File size:639488 bytes
              MD5 hash:1DC30F0B34A4F0D1404DC25A1CD54F6E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.291660403.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.291660403.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.291660403.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.292801706.0000000003C39000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.292801706.0000000003C39000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.292643698.0000000002C31000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.292643698.0000000002C31000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low

              General

              Start time:21:30:51
              Start date:13/01/2021
              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              Wow64 process (32bit):true
              Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
              Imagebase:0x300000
              File size:639488 bytes
              MD5 hash:1DC30F0B34A4F0D1404DC25A1CD54F6E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000F.00000002.298640803.00000000036B9000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000F.00000002.298640803.00000000036B9000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000F.00000002.298640803.00000000036B9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 0000000F.00000002.296751787.00000000026B1000.00000004.00000001.sdmp, Author: Joe Security
              Reputation:low

              General

              Start time:21:30:58
              Start date:13/01/2021
              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              Wow64 process (32bit):true
              Commandline:{path}
              Imagebase:0x490000
              File size:639488 bytes
              MD5 hash:1DC30F0B34A4F0D1404DC25A1CD54F6E
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.314926958.0000000003A39000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.314926958.0000000003A39000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.314829401.0000000002A31000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.314829401.0000000002A31000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000015.00000002.313795834.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000015.00000002.313795834.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000015.00000002.313795834.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low

              Disassembly

              Code Analysis

              Reset < >