Loading ...

Play interactive tourEdit tour

Analysis Report MEDUSI492126.pdf.exe

Overview

General Information

Sample Name:MEDUSI492126.pdf.exe
Analysis ID:341430
MD5:3f350480fd99bd2e9c9b32c9fa1bf4e0
SHA1:7fda4a5e9610d3df93ec08c855e73a4b2b0570f4
SHA256:c914e1cead39ffb086bb87029bcea3673f8159087ef8cd7c1cf49eceba97ee07
Tags:exeMSCNanoCoreRAT

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Yara detected Nanocore RAT
.NET source code contains potential unpacker
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Uses an obfuscated file name to hide its real file extension (double extension)
Uses dynamic DNS services
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Yara signature match

Classification

Startup

  • System is w10x64
  • MEDUSI492126.pdf.exe (PID: 6088 cmdline: 'C:\Users\user\Desktop\MEDUSI492126.pdf.exe' MD5: 3F350480FD99BD2E9C9B32C9FA1BF4E0)
    • cmd.exe (PID: 4764 cmdline: 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'retyujik' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 5308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • reg.exe (PID: 4280 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'retyujik' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
    • hgjgfddsxaz.exe (PID: 6920 cmdline: 'C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe' MD5: 3F350480FD99BD2E9C9B32C9FA1BF4E0)
      • InstallUtil.exe (PID: 5896 cmdline: C:\Users\user\AppData\Local\Temp\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"C2: ": ["185.162.88.26"], "Version: ": "NanoCore Client, Version=1.2.2.0"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000014.00000002.592972004.0000000004172000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x4342d:$x1: NanoCore.ClientPluginHost
  • 0x4346a:$x2: IClientNetworkHost
  • 0x46f9d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000014.00000002.592972004.0000000004172000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000014.00000002.592972004.0000000004172000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x43195:$a: NanoCore
    • 0x431a5:$a: NanoCore
    • 0x433d9:$a: NanoCore
    • 0x433ed:$a: NanoCore
    • 0x4342d:$a: NanoCore
    • 0x431f4:$b: ClientPlugin
    • 0x433f6:$b: ClientPlugin
    • 0x43436:$b: ClientPlugin
    • 0x4331b:$c: ProjectData
    • 0x43d22:$d: DESCrypto
    • 0x4b6ee:$e: KeepAlive
    • 0x496dc:$g: LogClientMessage
    • 0x458d7:$i: get_Connected
    • 0x44058:$j: #=q
    • 0x44088:$j: #=q
    • 0x440a4:$j: #=q
    • 0x440d4:$j: #=q
    • 0x440f0:$j: #=q
    • 0x4410c:$j: #=q
    • 0x4413c:$j: #=q
    • 0x44158:$j: #=q
    00000000.00000002.338088857.0000000004A4A000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x11007:$x1: NanoCore.ClientPluginHost
    • 0x43bc5:$x1: NanoCore.ClientPluginHost
    • 0x11044:$x2: IClientNetworkHost
    • 0x43c02:$x2: IClientNetworkHost
    • 0x14b77:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x47735:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000000.00000002.338088857.0000000004A4A000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 29 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      24.2.InstallUtil.exe.58e0000.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      24.2.InstallUtil.exe.58e0000.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      24.2.InstallUtil.exe.5900000.4.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xd9ad:$x1: NanoCore.ClientPluginHost
      • 0xd9da:$x2: IClientNetworkHost
      24.2.InstallUtil.exe.5900000.4.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xd9ad:$x2: NanoCore.ClientPluginHost
      • 0xea88:$s4: PipeCreated
      • 0xd9c7:$s5: IClientLoggingHost
      24.2.InstallUtil.exe.5900000.4.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 7 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, ProcessId: 5896, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: InstallUtil.exe.5896.24.memstrMalware Configuration Extractor: NanoCore {"C2: ": ["185.162.88.26"], "Version: ": "NanoCore Client, Version=1.2.2.0"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeVirustotal: Detection: 34%Perma Link
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeReversingLabs: Detection: 20%
        Multi AV Scanner detection for submitted fileShow sources
        Source: MEDUSI492126.pdf.exeVirustotal: Detection: 34%Perma Link
        Source: MEDUSI492126.pdf.exeReversingLabs: Detection: 20%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000014.00000002.592972004.0000000004172000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.338088857.0000000004A4A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.593076062.0000000004205000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.589229834.00000000042A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.580480048.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.592779539.0000000005900000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.337626085.00000000048E8000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.593637409.000000000439B000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MEDUSI492126.pdf.exe PID: 6088, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5896, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: hgjgfddsxaz.exe PID: 6920, type: MEMORY
        Source: Yara matchFile source: 24.2.InstallUtil.exe.5900000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.InstallUtil.exe.5900000.4.raw.unpack, type: UNPACKEDPE
        Source: 24.2.InstallUtil.exe.5900000.4.unpackAvira: Label: TR/NanoCore.fadte
        Source: 24.2.InstallUtil.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7

        Compliance:

        barindex
        Uses 32bit PE filesShow sources
        Source: MEDUSI492126.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
        Source: MEDUSI492126.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
        Binary contains paths to debug symbolsShow sources
        Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdb source: InstallUtil.exe, 00000018.00000002.583357176.00000000015C8000.00000004.00000020.sdmp
        Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: MEDUSI492126.pdf.exe, 00000000.00000003.298714752.0000000008321000.00000004.00000001.sdmp, InstallUtil.exe, 00000018.00000002.580942678.0000000000E02000.00000002.00020000.sdmp, InstallUtil.exe.0.dr
        Source: Binary string: InstallUtil.pdb source: MEDUSI492126.pdf.exe, 00000000.00000003.298714752.0000000008321000.00000004.00000001.sdmp, InstallUtil.exe, InstallUtil.exe.0.dr
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then push dword ptr [ebp-24h]
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then jmp 076A0806h
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then push dword ptr [ebp-24h]
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then xor edx, edx
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then xor edx, edx
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then push dword ptr [ebp-20h]
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then push dword ptr [ebp-20h]
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then jmp 076A0806h
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorIPs: 185.162.88.26
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: fenixalec.ddns.net
        Source: global trafficTCP traffic: 192.168.2.3:49753 -> 185.162.88.26:20911
        Source: Joe Sandbox ViewASN Name: AS40676US AS40676US
        Source: unknownDNS traffic detected: queries for: fenixalec.ddns.net
        Source: MEDUSI492126.pdf.exe, 00000000.00000003.335533082.0000000001849000.00000004.00000001.sdmpString found in binary or memory: http://ns.ado/Ident
        Source: MEDUSI492126.pdf.exe, 00000000.00000002.336435982.0000000001370000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: InstallUtil.exe, 00000018.00000002.589229834.00000000042A9000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000014.00000002.592972004.0000000004172000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.338088857.0000000004A4A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.593076062.0000000004205000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.589229834.00000000042A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.580480048.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.592779539.0000000005900000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.337626085.00000000048E8000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.593637409.000000000439B000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MEDUSI492126.pdf.exe PID: 6088, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5896, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: hgjgfddsxaz.exe PID: 6920, type: MEMORY
        Source: Yara matchFile source: 24.2.InstallUtil.exe.5900000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.InstallUtil.exe.5900000.4.raw.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000014.00000002.592972004.0000000004172000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000014.00000002.592972004.0000000004172000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.338088857.0000000004A4A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.338088857.0000000004A4A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000014.00000002.593076062.0000000004205000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000014.00000002.593076062.0000000004205000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000018.00000002.589229834.00000000042A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000018.00000002.580480048.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000018.00000002.580480048.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000018.00000002.592742291.00000000058E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000018.00000002.592779539.0000000005900000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.337626085.00000000048E8000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.337626085.00000000048E8000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000014.00000002.593637409.000000000439B000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000014.00000002.593637409.000000000439B000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: MEDUSI492126.pdf.exe PID: 6088, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: MEDUSI492126.pdf.exe PID: 6088, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: InstallUtil.exe PID: 5896, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: InstallUtil.exe PID: 5896, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: hgjgfddsxaz.exe PID: 6920, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: hgjgfddsxaz.exe PID: 6920, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 24.2.InstallUtil.exe.58e0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.2.InstallUtil.exe.5900000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 24.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 24.2.InstallUtil.exe.5900000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: MEDUSI492126.pdf.exe
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeCode function: 0_2_012AA949
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeCode function: 0_2_012ACB70
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeCode function: 0_2_012A5398
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeCode function: 0_2_012A1510
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeCode function: 0_2_012A4C30
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeCode function: 0_2_012AB441
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeCode function: 0_2_012AA480
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeCode function: 0_2_012AE632
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_04EC13F8
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_04EC0CC8
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_04EC3318
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_04EC29D8
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_04EB63AB
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_04EB48A2
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_04EC3D60
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_04EC2560
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_00C7A949
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_00C75398
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_00C7CB70
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_00C7A480
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_00C7B441
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_00C74C30
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_00C71510
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_00C7E630
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_076AD5D8
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_076A63A0
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_076AF2E8
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_076A0040
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_076ADFC0
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_076ABA78
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_076A0820
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_076AD5C8
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_076A6390
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_076AF2DB
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_076A0006
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_076ADFB0
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_076A5DE1
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_076A5DF0
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_00E020B0
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_031CE471
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_031CE480
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 24_2_031CBBD4
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\InstallUtil.exe 46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
        Source: MEDUSI492126.pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: MEDUSI492126.pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: MEDUSI492126.pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: hgjgfddsxaz.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: hgjgfddsxaz.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: hgjgfddsxaz.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: MEDUSI492126.pdf.exe, 00000000.00000002.338494033.0000000004FD0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs MEDUSI492126.pdf.exe
        Source: MEDUSI492126.pdf.exe, 00000000.00000002.338494033.0000000004FD0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs MEDUSI492126.pdf.exe
        Source: MEDUSI492126.pdf.exe, 00000000.00000002.340692963.0000000005650000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs MEDUSI492126.pdf.exe
        Source: MEDUSI492126.pdf.exe, 00000000.00000003.298714752.0000000008321000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameInstallUtil.exeT vs MEDUSI492126.pdf.exe
        Source: MEDUSI492126.pdf.exe, 00000000.00000002.337274177.0000000003F71000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSHCore1.dll0 vs MEDUSI492126.pdf.exe
        Source: MEDUSI492126.pdf.exe, 00000000.00000002.338327655.0000000004F70000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs MEDUSI492126.pdf.exe
        Source: MEDUSI492126.pdf.exe, 00000000.00000002.336435982.0000000001370000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs MEDUSI492126.pdf.exe
        Source: MEDUSI492126.pdf.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'retyujik' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe'
        Source: 00000014.00000002.592972004.0000000004172000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000014.00000002.592972004.0000000004172000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.338088857.0000000004A4A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.338088857.0000000004A4A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000014.00000002.593076062.0000000004205000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000014.00000002.593076062.0000000004205000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000018.00000002.589229834.00000000042A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000018.00000002.580480048.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000018.00000002.580480048.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000018.00000002.592742291.00000000058E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000018.00000002.592742291.00000000058E0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000018.00000002.592779539.0000000005900000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000018.00000002.592779539.0000000005900000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000000.00000002.337626085.00000000048E8000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.337626085.00000000048E8000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000014.00000002.593637409.000000000439B000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000014.00000002.593637409.000000000439B000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: MEDUSI492126.pdf.exe PID: 6088, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: MEDUSI492126.pdf.exe PID: 6088, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: InstallUtil.exe PID: 5896, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: InstallUtil.exe PID: 5896, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: hgjgfddsxaz.exe PID: 6920, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: hgjgfddsxaz.exe PID: 6920, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 24.2.InstallUtil.exe.58e0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.InstallUtil.exe.58e0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 24.2.InstallUtil.exe.5900000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.InstallUtil.exe.5900000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 24.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 24.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 24.2.InstallUtil.exe.5900000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 24.2.InstallUtil.exe.5900000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 24.2.InstallUtil.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 24.2.InstallUtil.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 24.2.InstallUtil.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@10/5@6/1
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeFile created: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeJump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5308:120:WilError_01
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{4c844ad7-de78-4c04-815b-d468ebb89811}
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to behavior
        Source: MEDUSI492126.pdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: MEDUSI492126.pdf.exeVirustotal: Detection: 34%
        Source: MEDUSI492126.pdf.exeReversingLabs: Detection: 20%
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeFile read: C:\Users\user\Desktop\MEDUSI492126.pdf.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\MEDUSI492126.pdf.exe 'C:\Users\user\Desktop\MEDUSI492126.pdf.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'retyujik' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'retyujik' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe'
        Source: unknownProcess created: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe 'C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe'
        Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'retyujik' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe'
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess created: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe 'C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe'
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'retyujik' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe'
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: MEDUSI492126.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: MEDUSI492126.pdf.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
        Source: Binary string: \??\C:\Windows\exe\InstallUtil.pdb source: InstallUtil.exe, 00000018.00000002.583357176.00000000015C8000.00000004.00000020.sdmp
        Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: MEDUSI492126.pdf.exe, 00000000.00000003.298714752.0000000008321000.00000004.00000001.sdmp, InstallUtil.exe, 00000018.00000002.580942678.0000000000E02000.00000002.00020000.sdmp, InstallUtil.exe.0.dr
        Source: Binary string: InstallUtil.pdb source: MEDUSI492126.pdf.exe, 00000000.00000003.298714752.0000000008321000.00000004.00000001.sdmp, InstallUtil.exe, InstallUtil.exe.0.dr

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 24.2.InstallUtil.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 24.2.InstallUtil.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_04EB05E6 pushfd ; iretd
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_04EB4E9A push es; iretd
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_04EB4B71 push es; iretd
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeCode function: 20_2_04EB0A2A push ds; ret
        Source: 24.2.InstallUtil.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 24.2.InstallUtil.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeFile created: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeJump to dropped file
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to dropped file
        Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run retyujikJump to behavior
        Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run retyujikJump to behavior

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeFile opened: C:\Users\user\Desktop\MEDUSI492126.pdf.exe\:Zone.Identifier read attributes | delete
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeFile opened: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe\:Zone.Identifier read attributes | delete
        Uses an obfuscated file name to hide its real file extension (double extension)Show sources
        Source: Possible double extension: pdf.exeStatic PE information: MEDUSI492126.pdf.exe
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeWindow / User API: threadDelayed 3727
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeWindow / User API: threadDelayed 6074
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeWindow / User API: threadDelayed 2679
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeWindow / User API: threadDelayed 7151
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: threadDelayed 1313
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: threadDelayed 8277
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: foregroundWindowGot 543
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exe TID: 3012Thread sleep time: -23980767295822402s >= -30000s
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exe TID: 3012Thread sleep time: -30000s >= -30000s
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exe TID: 3728Thread sleep count: 3727 > 30
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exe TID: 3728Thread sleep count: 6074 > 30
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe TID: 6504Thread sleep time: -21213755684765971s >= -30000s
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe TID: 6504Thread sleep time: -30000s >= -30000s
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe TID: 7152Thread sleep count: 2679 > 30
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe TID: 7152Thread sleep count: 7151 > 30
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exe TID: 5044Thread sleep time: -10145709240540247s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: InstallUtil.exe, 00000018.00000002.583704046.00000000015E9000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllkb}
        Source: hgjgfddsxaz.exe, 00000014.00000002.592813356.00000000038C1000.00000004.00000001.sdmpBinary or memory string: VMware
        Source: hgjgfddsxaz.exe, 00000014.00000002.592813356.00000000038C1000.00000004.00000001.sdmpBinary or memory string: vmware svga
        Source: MEDUSI492126.pdf.exe, 00000000.00000002.336503892.00000000013AE000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:
        Source: MEDUSI492126.pdf.exe, 00000000.00000002.340692963.0000000005650000.00000002.00000001.sdmp, reg.exe, 00000003.00000002.233158420.00000000027B0000.00000002.00000001.sdmp, InstallUtil.exe, 00000018.00000002.593585742.0000000006C40000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: hgjgfddsxaz.exe, 00000014.00000002.592813356.00000000038C1000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: MEDUSI492126.pdf.exe, 00000000.00000002.337274177.0000000003F71000.00000004.00000001.sdmp, hgjgfddsxaz.exe, 00000014.00000002.592813356.00000000038C1000.00000004.00000001.sdmpBinary or memory string: tpautoconnsvc#Microsoft Hyper-V
        Source: MEDUSI492126.pdf.exe, 00000000.00000002.337274177.0000000003F71000.00000004.00000001.sdmp, hgjgfddsxaz.exe, 00000014.00000002.592813356.00000000038C1000.00000004.00000001.sdmpBinary or memory string: cmd.txtQEMUqemu
        Source: MEDUSI492126.pdf.exe, 00000000.00000002.342481616.0000000008341000.00000004.00000001.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\
        Source: MEDUSI492126.pdf.exe, 00000000.00000002.337274177.0000000003F71000.00000004.00000001.sdmp, hgjgfddsxaz.exe, 00000014.00000002.592813356.00000000038C1000.00000004.00000001.sdmpBinary or memory string: vmusrvc
        Source: hgjgfddsxaz.exe, 00000014.00000002.592813356.00000000038C1000.00000004.00000001.sdmpBinary or memory string: vmsrvc
        Source: hgjgfddsxaz.exe, 00000014.00000002.592813356.00000000038C1000.00000004.00000001.sdmpBinary or memory string: vmtools
        Source: hgjgfddsxaz.exe, 00000014.00000002.592813356.00000000038C1000.00000004.00000001.sdmpBinary or memory string: vmware sata5vmware usb pointing device-vmware vmci bus deviceCvmware virtual s scsi disk device
        Source: hgjgfddsxaz.exe, 00000014.00000002.592813356.00000000038C1000.00000004.00000001.sdmpBinary or memory string: vboxservicevbox)Microsoft Virtual PC
        Source: MEDUSI492126.pdf.exe, 00000000.00000002.340692963.0000000005650000.00000002.00000001.sdmp, reg.exe, 00000003.00000002.233158420.00000000027B0000.00000002.00000001.sdmp, InstallUtil.exe, 00000018.00000002.593585742.0000000006C40000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: MEDUSI492126.pdf.exe, 00000000.00000002.340692963.0000000005650000.00000002.00000001.sdmp, reg.exe, 00000003.00000002.233158420.00000000027B0000.00000002.00000001.sdmp, InstallUtil.exe, 00000018.00000002.593585742.0000000006C40000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: hgjgfddsxaz.exe, 00000014.00000002.592813356.00000000038C1000.00000004.00000001.sdmpBinary or memory string: virtual-vmware pointing device
        Source: MEDUSI492126.pdf.exe, 00000000.00000002.340692963.0000000005650000.00000002.00000001.sdmp, reg.exe, 00000003.00000002.233158420.00000000027B0000.00000002.00000001.sdmp, InstallUtil.exe, 00000018.00000002.593585742.0000000006C40000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Allocates memory in foreign processesShow sources
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeMemory allocated: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 400000 protect: page execute and read and write
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 400000 value starts with: 4D5A
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 400000
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 402000
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 420000
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 422000
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 107C008
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'retyujik' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe'
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeProcess created: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe 'C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe'
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'retyujik' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe'
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
        Source: hgjgfddsxaz.exe, 00000014.00000002.584939060.0000000001240000.00000002.00000001.sdmp, InstallUtil.exe, 00000018.00000002.593460206.000000000687D000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: InstallUtil.exe, 00000018.00000002.585286702.00000000032B7000.00000004.00000001.sdmpBinary or memory string: Program Managerd
        Source: hgjgfddsxaz.exe, 00000014.00000002.584939060.0000000001240000.00000002.00000001.sdmp, InstallUtil.exe, 00000018.00000002.584270428.0000000001BD0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: hgjgfddsxaz.exe, 00000014.00000002.584939060.0000000001240000.00000002.00000001.sdmp, InstallUtil.exe, 00000018.00000002.584270428.0000000001BD0000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: InstallUtil.exe, 00000018.00000002.585286702.00000000032B7000.00000004.00000001.sdmpBinary or memory string: Program ManagerHa+l
        Source: hgjgfddsxaz.exe, 00000014.00000002.584939060.0000000001240000.00000002.00000001.sdmp, InstallUtil.exe, 00000018.00000002.584270428.0000000001BD0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeQueries volume information: C:\Users\user\Desktop\MEDUSI492126.pdf.exe VolumeInformation
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeQueries volume information: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe VolumeInformation
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\hgjgfddsxaz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Users\user\AppData\Local\Temp\InstallUtil.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\MEDUSI492126.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000014.00000002.592972004.0000000004172000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.338088857.0000000004A4A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.593076062.0000000004205000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.589229834.00000000042A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.580480048.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.592779539.0000000005900000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.337626085.00000000048E8000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.593637409.000000000439B000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MEDUSI492126.pdf.exe PID: 6088, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5896, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: hgjgfddsxaz.exe PID: 6920, type: MEMORY
        Source: Yara matchFile source: 24.2.InstallUtil.exe.5900000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.InstallUtil.exe.5900000.4.raw.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: MEDUSI492126.pdf.exe, 00000000.00000002.338088857.0000000004A4A000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: hgjgfddsxaz.exe, 00000014.00000002.593637409.000000000439B000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: InstallUtil.exe, 00000018.00000002.585286702.00000000032B7000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: InstallUtil.exe, 00000018.00000002.585286702.00000000032B7000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000014.00000002.592972004.0000000004172000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.338088857.0000000004A4A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.593076062.0000000004205000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.589229834.00000000042A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.580480048.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000018.00000002.592779539.0000000005900000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.337626085.00000000048E8000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000014.00000002.593637409.000000000439B000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: MEDUSI492126.pdf.exe PID: 6088, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5896, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: hgjgfddsxaz.exe PID: 6920, type: MEMORY
        Source: Yara matchFile source: 24.2.InstallUtil.exe.5900000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 24.2.InstallUtil.exe.5900000.4.raw.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsWindows Management InstrumentationRegistry Run Keys / Startup Folder1Process Injection312Masquerading11Input Capture21Query Registry1Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsRegistry Run Keys / Startup Folder1Modify Registry1LSASS MemorySecurity Software Discovery111Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion3Security Account ManagerVirtualization/Sandbox Evasion3SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Disable or Modify Tools1NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptProcess Injection312LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonDeobfuscate/Decode Files or Information1Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsHidden Files and Directories1DCSyncSystem Information Discovery12Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobObfuscated Files or Information12Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Software Packing11/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        MEDUSI492126.pdf.exe34%VirustotalBrowse
        MEDUSI492126.pdf.exe20%ReversingLabs

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%VirustotalBrowse
        C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%MetadefenderBrowse
        C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%ReversingLabs
        C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe34%VirustotalBrowse
        C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe20%ReversingLabs

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        24.2.InstallUtil.exe.5900000.4.unpack100%AviraTR/NanoCore.fadteDownload File
        24.2.InstallUtil.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        SourceDetectionScannerLabelLink
        fenixalec.ddns.net4%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://ns.ado/Ident0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        fenixalec.ddns.net
        185.162.88.26
        truetrueunknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://ns.ado/IdentMEDUSI492126.pdf.exe, 00000000.00000003.335533082.0000000001849000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        185.162.88.26
        unknownNetherlands
        40676AS40676UStrue

        General Information

        Joe Sandbox Version:31.0.0 Red Diamond
        Analysis ID:341430
        Start date:19.01.2021
        Start time:10:46:05
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 10m 27s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:MEDUSI492126.pdf.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:33
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@10/5@6/1
        EGA Information:Failed
        HDC Information:
        • Successful, ratio: 0.4% (good quality ratio 0.3%)
        • Quality average: 53.1%
        • Quality standard deviation: 34.8%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        Warnings:
        Show All
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
        • Excluded IPs from analysis (whitelisted): 52.255.188.83, 40.88.32.150, 23.210.248.85, 51.11.168.160, 92.122.213.194, 92.122.213.247, 93.184.221.240, 51.103.5.186, 52.254.96.93, 20.54.26.129, 51.104.139.180
        • Excluded domains from analysis (whitelisted): arc.msn.com.nsatc.net, bn2eap.displaycatalog.md.mp.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, wns.notify.windows.com.akadns.net, arc.msn.com, wu.azureedge.net, skypedataprdcoleus15.cloudapp.net, emea1.notify.windows.com.akadns.net, audownload.windowsupdate.nsatc.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, wu.wpc.apr-52dd2.edgecastdns.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, client.wns.windows.com, fs.microsoft.com, wu.ec.azureedge.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, par02p.wns.notify.trafficmanager.net
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtReadVirtualMemory calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        10:47:07API Interceptor199x Sleep call for process: MEDUSI492126.pdf.exe modified
        10:47:08AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run retyujik C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe
        10:47:16AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run retyujik C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe
        10:48:00API Interceptor217x Sleep call for process: hgjgfddsxaz.exe modified

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        185.162.88.26silkOrder00110.pdf.exeGet hashmaliciousBrowse
          Order_BC012356.pdf.exeGet hashmaliciousBrowse
            Document#20014464370.pdf.exeGet hashmaliciousBrowse

              Domains

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              fenixalec.ddns.netsilkOrder00110.pdf.exeGet hashmaliciousBrowse
              • 185.162.88.26
              Order_BC012356.pdf.exeGet hashmaliciousBrowse
              • 185.162.88.26
              Document#20014464370.pdf.exeGet hashmaliciousBrowse
              • 185.162.88.26

              ASN

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              AS40676USRequest for Quotation.exeGet hashmaliciousBrowse
              • 45.34.249.53
              silkOrder00110.pdf.exeGet hashmaliciousBrowse
              • 185.162.88.26
              Order_BC012356.pdf.exeGet hashmaliciousBrowse
              • 185.162.88.26
              Document#20014464370.pdf.exeGet hashmaliciousBrowse
              • 185.162.88.26
              t1XJOlYvhExZyrm.exeGet hashmaliciousBrowse
              • 104.225.208.15
              SWIFT_COPY00993Payment_advic4555pdf.exeGet hashmaliciousBrowse
              • 172.106.111.244
              QN08qH1zYv.exeGet hashmaliciousBrowse
              • 104.149.57.92
              SWIFT-COPY Payment advice3243343.exeGet hashmaliciousBrowse
              • 172.106.111.244
              catalogo TAWI group.exeGet hashmaliciousBrowse
              • 107.160.127.252
              Rfq 214871_TAWI Catalog.exeGet hashmaliciousBrowse
              • 107.160.127.252
              Rfq_Catalog.exeGet hashmaliciousBrowse
              • 107.160.127.252
              NPD76122.exeGet hashmaliciousBrowse
              • 104.217.231.247
              h3dFAROdF3.exeGet hashmaliciousBrowse
              • 104.217.231.248
              d2mISAbTQN.exeGet hashmaliciousBrowse
              • 104.217.231.248
              n41pVXkYCe.exeGet hashmaliciousBrowse
              • 104.217.231.248
              kqwqyoFz1C.exeGet hashmaliciousBrowse
              • 104.217.231.248
              53McmgaUJP.exeGet hashmaliciousBrowse
              • 104.217.231.248
              BsR85tOyjL.exeGet hashmaliciousBrowse
              • 104.217.231.248
              Ctr-066970-xlsx.HtmLGet hashmaliciousBrowse
              • 173.224.209.14
              athwIp3L1t.exeGet hashmaliciousBrowse
              • 104.217.231.248

              JA3 Fingerprints

              No context

              Dropped Files

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              C:\Users\user\AppData\Local\Temp\InstallUtil.exe2GNCGUZ6JU.exeGet hashmaliciousBrowse
                IMG_53771.pdf.exeGet hashmaliciousBrowse
                  SecuriteInfo.com.Generic.mg.fb5363e0cae04979.exeGet hashmaliciousBrowse
                    Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousBrowse
                      silkOrder00110.pdf.exeGet hashmaliciousBrowse
                        74725794.exeGet hashmaliciousBrowse
                          74725794.exeGet hashmaliciousBrowse
                            IMG_53091.pdf.exeGet hashmaliciousBrowse
                              IMG_71103.pdf.exeGet hashmaliciousBrowse
                                WjIKk3FzeI.exeGet hashmaliciousBrowse
                                  iv2yPzJEMs.exeGet hashmaliciousBrowse
                                    Jb4NE4iWz5.exeGet hashmaliciousBrowse
                                      mmcrkHjIb3.exeGet hashmaliciousBrowse
                                        fkGmyP7ryc.exeGet hashmaliciousBrowse
                                          product supplies 10589TW.exeGet hashmaliciousBrowse
                                            IMG_13791.pdf.exeGet hashmaliciousBrowse
                                              Order_BC012356.pdf.exeGet hashmaliciousBrowse
                                                pls.exeGet hashmaliciousBrowse
                                                  Document#20014464370.pdf.exeGet hashmaliciousBrowse
                                                    SecuriteInfo.com.Trojan.PackedNET.505.30555.exeGet hashmaliciousBrowse

                                                      Created / dropped Files

                                                      C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MEDUSI492126.pdf.exe.log
                                                      Process:C:\Users\user\Desktop\MEDUSI492126.pdf.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:modified
                                                      Size (bytes):1451
                                                      Entropy (8bit):5.345862727722058
                                                      Encrypted:false
                                                      SSDEEP:24:MLU84qpE4Ks2eE4O1lEE4UVwPKDE4KhK3VZ9pKhuE4IWUAE4KI6nx1qE4j:Mgv2HKXeHKlEHU0YHKhQnouHIW7HKjxm
                                                      MD5:A3A3A85F33BFAD9A069110C913DAD818
                                                      SHA1:E2DA64F657CC1DE2DD27787B9F365CF84508E833
                                                      SHA-256:DE24C0B69909C9864E60CC7DA755471426C0CDF549ECDBBE65E31F2359633555
                                                      SHA-512:3A553007132E1050A97A262A21DCA3AB1A3442EBB51E6DDD7337B6454A97472937ADE6FDEB52568A30D32EAEF01800A4BC16C7F75236E9E2001C975D8C514F19
                                                      Malicious:true
                                                      Reputation:moderate, very likely benign file
                                                      Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Cul
                                                      C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                      Process:C:\Users\user\Desktop\MEDUSI492126.pdf.exe
                                                      File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):41064
                                                      Entropy (8bit):6.164873449128079
                                                      Encrypted:false
                                                      SSDEEP:384:FtpFVLK0MsihB9VKS7xdgE7KJ9Yl6dnPU3SERztmbqCJstdMardz/JikPZ+sPZTd:ZBMs2SqdD86Iq8gZZFyViML3an
                                                      MD5:EFEC8C379D165E3F33B536739AEE26A3
                                                      SHA1:C875908ACBA5CAC1E0B40F06A83F0F156A2640FA
                                                      SHA-256:46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
                                                      SHA-512:497847EC115D9AF78899E6DC20EC32A60B16954F83CF5169A23DD3F1459CB632DAC95417BD898FD1895C9FE2262FCBF7838FCF6919FB3B851A0557FBE07CCFFA
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                      • Antivirus: Metadefender, Detection: 0%, Browse
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Joe Sandbox View:
                                                      • Filename: 2GNCGUZ6JU.exe, Detection: malicious, Browse
                                                      • Filename: IMG_53771.pdf.exe, Detection: malicious, Browse
                                                      • Filename: SecuriteInfo.com.Generic.mg.fb5363e0cae04979.exe, Detection: malicious, Browse
                                                      • Filename: Ziraat Bankasi Swift Mesaji.exe, Detection: malicious, Browse
                                                      • Filename: silkOrder00110.pdf.exe, Detection: malicious, Browse
                                                      • Filename: 74725794.exe, Detection: malicious, Browse
                                                      • Filename: 74725794.exe, Detection: malicious, Browse
                                                      • Filename: IMG_53091.pdf.exe, Detection: malicious, Browse
                                                      • Filename: IMG_71103.pdf.exe, Detection: malicious, Browse
                                                      • Filename: WjIKk3FzeI.exe, Detection: malicious, Browse
                                                      • Filename: iv2yPzJEMs.exe, Detection: malicious, Browse
                                                      • Filename: Jb4NE4iWz5.exe, Detection: malicious, Browse
                                                      • Filename: mmcrkHjIb3.exe, Detection: malicious, Browse
                                                      • Filename: fkGmyP7ryc.exe, Detection: malicious, Browse
                                                      • Filename: product supplies 10589TW.exe, Detection: malicious, Browse
                                                      • Filename: IMG_13791.pdf.exe, Detection: malicious, Browse
                                                      • Filename: Order_BC012356.pdf.exe, Detection: malicious, Browse
                                                      • Filename: pls.exe, Detection: malicious, Browse
                                                      • Filename: Document#20014464370.pdf.exe, Detection: malicious, Browse
                                                      • Filename: SecuriteInfo.com.Trojan.PackedNET.505.30555.exe, Detection: malicious, Browse
                                                      Reputation:moderate, very likely benign file
                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z..............0..T...........r... ........@.. ....................................`.................................4r..O....................b..h>...........p............................................... ............... ..H............text....R... ...T.................. ..`.rsrc................V..............@..@.reloc...............`..............@..B................hr......H........"..|J..........lm.......o......................................2~.....o....*.r...p(....*VrK..p(....s.........*..0..........(....(....o....o....(....o.... .....T(....o....(....o....o ...o!....4(....o....(....o....o ...o".....(....rm..ps#...o....($........(%....o&....ry..p......%.r...p.%.(.....(....('....((.......o)...('........*.*................"..(*...*..{Q...-...}Q.....(+...(....(,....(+...*"..(-...*..(....*..(.....r...p.(/...o0...s....}T...*....0.. .......~S...-.s
                                                      C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                      Process:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):8
                                                      Entropy (8bit):3.0
                                                      Encrypted:false
                                                      SSDEEP:3:FP:N
                                                      MD5:0F9353C664ED8948D75EC8D08B5C87EA
                                                      SHA1:25646DB26539BB0EB26344950033CFA1A794555A
                                                      SHA-256:4E078D6CA2C68B2A23D8795BFB3B48E7D8A63675A1CE72FF7F60C205192438D8
                                                      SHA-512:DD430C5E05196BD0D0F5BB31BC8722E8F78440727E5E579A7788BB1A66F66F0AD3420F29C542D72D09D59D7FA97ECB903622335CF1981B05C7BE45949DEFA435
                                                      Malicious:true
                                                      Reputation:low
                                                      Preview: \.....H
                                                      C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe
                                                      Process:C:\Users\user\Desktop\MEDUSI492126.pdf.exe
                                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):942080
                                                      Entropy (8bit):5.3133493633744555
                                                      Encrypted:false
                                                      SSDEEP:6144:gGg4kMF2VtDYY4ULce5ly3DF/5892Rfx7y7H+mff7BBTkNAo23KB2pTwcSn9vCfK:gkkzjLzlyzF/B1aHpTkJ23d9ZSn9Vtz
                                                      MD5:3F350480FD99BD2E9C9B32C9FA1BF4E0
                                                      SHA1:7FDA4A5E9610D3DF93EC08C855E73A4B2B0570F4
                                                      SHA-256:C914E1CEAD39FFB086BB87029BCEA3673F8159087EF8CD7C1CF49ECEBA97EE07
                                                      SHA-512:CA55F5A74EE282E988654B01C500AA93CA51BBEF415255E1C850739C603B00F777A86B13935C56EFCAEF0850E623EACB2C3EA29773897CD88146E16C4C26A3D9
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Virustotal, Detection: 34%, Browse
                                                      • Antivirus: ReversingLabs, Detection: 20%
                                                      Reputation:low
                                                      Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....K................................... ........@.. ....................................`.................................P...K........|........................................................................... ............... ..H............text........ ...................... ..`.rsrc....|.......~..................@..@.reloc...............^..............@..B........................H...........4%......%...h................................................O^."b..o._g.F.3.$..2PU#.....5l.`.........@.R9.P...?..]!&.....N.o.J.Mx............l. .o9....*..&.....^.d.|.X..z4...x.....[.o...8.e.g...a....V#V.a@..k....Z7NB.#......L...h.....exl>7..{..{.(....#ii.>.}.v".!-YC.=..e.:tc._.e..|ey...bL....T.K..pKnT..Qr.w...b..6..5..W..w1..U...j.o.............^..E.!.B..l....Z........iT...Fu3.=.).d.u.G.....<G..H..YY...}E.>....,..A.W.%.i..>T.........
                                                      C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe:Zone.Identifier
                                                      Process:C:\Users\user\Desktop\MEDUSI492126.pdf.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):26
                                                      Entropy (8bit):3.95006375643621
                                                      Encrypted:false
                                                      SSDEEP:3:ggPYV:rPYV
                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                      Malicious:true
                                                      Reputation:high, very likely benign file
                                                      Preview: [ZoneTransfer]....ZoneId=0

                                                      Static File Info

                                                      General

                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Entropy (8bit):5.3133493633744555
                                                      TrID:
                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                      • DOS Executable Generic (2002/1) 0.01%
                                                      File name:MEDUSI492126.pdf.exe
                                                      File size:942080
                                                      MD5:3f350480fd99bd2e9c9b32c9fa1bf4e0
                                                      SHA1:7fda4a5e9610d3df93ec08c855e73a4b2b0570f4
                                                      SHA256:c914e1cead39ffb086bb87029bcea3673f8159087ef8cd7c1cf49eceba97ee07
                                                      SHA512:ca55f5a74ee282e988654b01c500aa93ca51bbef415255e1c850739c603b00f777a86b13935c56efcaef0850e623eacb2c3ea29773897cd88146e16c4c26a3d9
                                                      SSDEEP:6144:gGg4kMF2VtDYY4ULce5ly3DF/5892Rfx7y7H+mff7BBTkNAo23KB2pTwcSn9vCfK:gkkzjLzlyzF/B1aHpTkJ23d9ZSn9Vtz
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....K................................... ........@.. ....................................`................................

                                                      File Icon

                                                      Icon Hash:98bee6a283829ec2

                                                      Static PE Info

                                                      General

                                                      Entrypoint:0x4dfc9e
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                      Time Stamp:0x7E64BFF [Thu Mar 14 22:47:27 1974 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:v4.0.30319
                                                      OS Version Major:4
                                                      OS Version Minor:0
                                                      File Version Major:4
                                                      File Version Minor:0
                                                      Subsystem Version Major:4
                                                      Subsystem Version Minor:0
                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                      Entrypoint Preview

                                                      Instruction
                                                      jmp dword ptr [00402000h]
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al
                                                      add byte ptr [eax], al

                                                      Data Directories

                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xdfc500x4b.text
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xe00000x7ca6.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xe80000xc.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                      Sections

                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x20000xddca40xdde00False0.442184198944data5.26895380135IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                      .rsrc0xe00000x7ca60x7e00False0.37394593254data5.76833442238IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0xe80000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                      Resources

                                                      NameRVASizeTypeLanguageCountry
                                                      RT_ICON0xe03400x128GLS_BINARY_LSB_FIRST
                                                      RT_ICON0xe04680x1e8data
                                                      RT_ICON0xe06500x2e8data
                                                      RT_ICON0xe09380x668dBase IV DBT of `.DBF, block length 1536, next free block index 40, next free block 224, next used block 768
                                                      RT_ICON0xe0fa00x568GLS_BINARY_LSB_FIRST
                                                      RT_ICON0xe15080x6c8data
                                                      RT_ICON0xe1bd00x8a8data
                                                      RT_ICON0xe24780xea8data
                                                      RT_ICON0xe33200x468GLS_BINARY_LSB_FIRST
                                                      RT_ICON0xe37880x988data
                                                      RT_ICON0xe41100x10a8data
                                                      RT_ICON0xe51b80x25a8data
                                                      RT_GROUP_ICON0xe77600xaedata
                                                      RT_VERSION0xe78100x2acdataEnglishUnited States
                                                      RT_MANIFEST0xe7abc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                      Imports

                                                      DLLImport
                                                      mscoree.dll_CorExeMain

                                                      Version Infos

                                                      DescriptionData
                                                      LegalCopyrightCopyright Opera Software 2020
                                                      InternalNameOpera
                                                      FileVersion72.0.3815.400
                                                      CompanyNameOpera Software
                                                      ProductNameOpera Installer
                                                      ProductVersion72.0.3815.400
                                                      FileDescriptionOpera Installer
                                                      Translation0x0409 0x04b0

                                                      Possible Origin

                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishUnited States

                                                      Network Behavior

                                                      Network Port Distribution

                                                      TCP Packets

                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 19, 2021 10:48:39.799494028 CET4975320911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:48:39.850183010 CET2091149753185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:48:40.352771997 CET4975320911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:48:40.403362989 CET2091149753185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:48:40.915400982 CET4975320911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:48:40.965732098 CET2091149753185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:48:45.026196003 CET4975420911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:48:45.077275038 CET2091149754185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:48:45.587601900 CET4975420911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:48:45.638434887 CET2091149754185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:48:46.150259018 CET4975420911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:48:46.201178074 CET2091149754185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:48:50.254041910 CET4975520911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:48:50.304646015 CET2091149755185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:48:50.806936026 CET4975520911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:48:50.857517004 CET2091149755185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:48:51.369324923 CET4975520911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:48:51.419913054 CET2091149755185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:48:57.271637917 CET4975620911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:48:57.322338104 CET2091149756185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:48:57.822993040 CET4975620911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:48:57.873528004 CET2091149756185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:48:58.385634899 CET4975620911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:48:58.436278105 CET2091149756185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:02.513295889 CET4975720911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:02.563802004 CET2091149757185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:03.073507071 CET4975720911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:03.124948025 CET2091149757185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:03.636002064 CET4975720911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:03.686744928 CET2091149757185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:07.763022900 CET4975820911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:07.813810110 CET2091149758185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:08.323844910 CET4975820911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:08.374386072 CET2091149758185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:08.886410952 CET4975820911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:08.936927080 CET2091149758185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:12.951097012 CET4975920911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:13.001657963 CET2091149759185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:13.511966944 CET4975920911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:13.562710047 CET2091149759185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:14.074307919 CET4975920911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:14.124994040 CET2091149759185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:18.298017979 CET4976020911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:18.349931955 CET2091149760185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:18.855928898 CET4976020911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:18.906542063 CET2091149760185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:19.418483973 CET4976020911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:19.469137907 CET2091149760185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:23.483203888 CET4976120911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:23.533657074 CET2091149761185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:24.043881893 CET4976120911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:24.094469070 CET2091149761185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:24.606532097 CET4976120911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:24.657203913 CET2091149761185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:29.104944944 CET4976220911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:29.155567884 CET2091149762185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:29.669359922 CET4976220911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:29.719840050 CET2091149762185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:30.231869936 CET4976220911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:30.282670975 CET2091149762185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:34.414669037 CET4976320911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:34.465291977 CET2091149763185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:34.966722012 CET4976320911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:35.017597914 CET2091149763185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:35.529232025 CET4976320911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:35.579931974 CET2091149763185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:39.664004087 CET4976420911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:39.715728998 CET2091149764185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:40.231916904 CET4976420911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:40.282701969 CET2091149764185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:40.792174101 CET4976420911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:40.842853069 CET2091149764185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:44.970376015 CET4976520911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:45.021239042 CET2091149765185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:45.526060104 CET4976520911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:45.576704025 CET2091149765185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:46.088587046 CET4976520911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:46.139318943 CET2091149765185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:50.152645111 CET4976620911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:50.204139948 CET2091149766185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:50.713996887 CET4976620911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:50.764695883 CET2091149766185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:51.276689053 CET4976620911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:51.327265024 CET2091149766185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:55.340390921 CET4976720911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:55.391318083 CET2091149767185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:55.901890039 CET4976720911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:55.953944921 CET2091149767185.162.88.26192.168.2.3
                                                      Jan 19, 2021 10:49:56.464458942 CET4976720911192.168.2.3185.162.88.26
                                                      Jan 19, 2021 10:49:56.515445948 CET2091149767185.162.88.26192.168.2.3

                                                      UDP Packets

                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 19, 2021 10:47:08.111047029 CET6493853192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:08.159177065 CET53649388.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:08.882317066 CET6015253192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:08.930907965 CET53601528.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:10.325284004 CET5754453192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:10.373076916 CET53575448.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:11.764595032 CET5598453192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:11.815249920 CET53559848.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:12.877542973 CET6418553192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:12.925451040 CET53641858.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:13.742988110 CET6511053192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:13.790821075 CET53651108.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:14.522783041 CET5836153192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:14.570580006 CET53583618.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:15.391833067 CET6349253192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:15.442576885 CET53634928.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:17.407469988 CET6083153192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:17.458266020 CET53608318.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:19.788703918 CET6010053192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:19.839462996 CET53601008.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:22.608747959 CET5319553192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:22.666836977 CET53531958.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:23.339910030 CET5014153192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:23.390599012 CET53501418.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:24.048716068 CET5302353192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:24.096540928 CET53530238.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:24.311482906 CET4956353192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:24.359246969 CET53495638.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:25.178965092 CET5135253192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:25.235213995 CET53513528.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:30.015100002 CET5934953192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:30.071324110 CET53593498.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:32.023372889 CET5708453192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:32.071376085 CET53570848.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:33.406830072 CET5882353192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:33.464437008 CET53588238.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:37.605518103 CET5756853192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:37.653419971 CET53575688.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:38.522526026 CET5054053192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:38.573723078 CET53505408.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:39.357963085 CET5436653192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:39.414597988 CET53543668.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:40.416655064 CET5303453192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:40.464510918 CET53530348.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:42.104981899 CET5776253192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:42.161494970 CET53577628.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:44.241782904 CET5543553192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:44.289643049 CET53554358.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:49.065593004 CET5071353192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:49.210273027 CET53507138.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:50.214858055 CET5613253192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:50.273946047 CET53561328.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:51.643054008 CET5898753192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:51.707396984 CET53589878.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:52.957469940 CET5657953192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:53.014153957 CET53565798.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:54.447529078 CET6063353192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:54.503731012 CET53606338.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:54.952896118 CET6129253192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:55.018655062 CET53612928.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:55.500391960 CET6361953192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:55.556713104 CET53636198.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:56.653456926 CET6493853192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:56.709825039 CET53649388.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:47:58.439755917 CET6194653192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:47:58.498681068 CET53619468.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:48:00.031099081 CET6491053192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:48:00.087548971 CET53649108.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:48:00.956382036 CET5212353192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:48:01.016108036 CET53521238.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:48:01.213134050 CET5613053192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:48:01.273766041 CET53561308.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:48:33.406441927 CET5633853192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:48:33.454292059 CET53563388.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:48:36.372833014 CET5942053192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:48:36.449378967 CET53594208.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:48:57.211781025 CET5878453192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:48:57.269583941 CET53587848.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:49:02.452044010 CET6397853192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:49:02.510519028 CET53639788.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:49:07.702106953 CET6293853192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:49:07.761039019 CET53629388.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:49:29.046714067 CET5570853192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:49:29.103327036 CET53557088.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:49:34.356945038 CET5680353192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:49:34.413094044 CET53568038.8.8.8192.168.2.3
                                                      Jan 19, 2021 10:49:39.596544981 CET5714553192.168.2.38.8.8.8
                                                      Jan 19, 2021 10:49:39.652793884 CET53571458.8.8.8192.168.2.3

                                                      DNS Queries

                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                      Jan 19, 2021 10:48:57.211781025 CET192.168.2.38.8.8.80xf11bStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                      Jan 19, 2021 10:49:02.452044010 CET192.168.2.38.8.8.80x1ab3Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                      Jan 19, 2021 10:49:07.702106953 CET192.168.2.38.8.8.80xb9fdStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                      Jan 19, 2021 10:49:29.046714067 CET192.168.2.38.8.8.80x5341Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                      Jan 19, 2021 10:49:34.356945038 CET192.168.2.38.8.8.80x301eStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                      Jan 19, 2021 10:49:39.596544981 CET192.168.2.38.8.8.80x3e5bStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)

                                                      DNS Answers

                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                      Jan 19, 2021 10:48:57.269583941 CET8.8.8.8192.168.2.30xf11bNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                      Jan 19, 2021 10:49:02.510519028 CET8.8.8.8192.168.2.30x1ab3No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                      Jan 19, 2021 10:49:07.761039019 CET8.8.8.8192.168.2.30xb9fdNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                      Jan 19, 2021 10:49:29.103327036 CET8.8.8.8192.168.2.30x5341No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                      Jan 19, 2021 10:49:34.413094044 CET8.8.8.8192.168.2.30x301eNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                      Jan 19, 2021 10:49:39.652793884 CET8.8.8.8192.168.2.30x3e5bNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)

                                                      Code Manipulations

                                                      Statistics

                                                      Behavior

                                                      Click to jump to process

                                                      System Behavior

                                                      General

                                                      Start time:10:47:01
                                                      Start date:19/01/2021
                                                      Path:C:\Users\user\Desktop\MEDUSI492126.pdf.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:'C:\Users\user\Desktop\MEDUSI492126.pdf.exe'
                                                      Imagebase:0xbb0000
                                                      File size:942080 bytes
                                                      MD5 hash:3F350480FD99BD2E9C9B32C9FA1BF4E0
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.338088857.0000000004A4A000.00000004.00000001.sdmp, Author: Florian Roth
                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.338088857.0000000004A4A000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.338088857.0000000004A4A000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.337626085.00000000048E8000.00000004.00000001.sdmp, Author: Florian Roth
                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.337626085.00000000048E8000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.337626085.00000000048E8000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                      Reputation:low

                                                      General

                                                      Start time:10:47:05
                                                      Start date:19/01/2021
                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'retyujik' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe'
                                                      Imagebase:0xbd0000
                                                      File size:232960 bytes
                                                      MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      General

                                                      Start time:10:47:06
                                                      Start date:19/01/2021
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6b2800000
                                                      File size:625664 bytes
                                                      MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      General

                                                      Start time:10:47:06
                                                      Start date:19/01/2021
                                                      Path:C:\Windows\SysWOW64\reg.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'retyujik' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe'
                                                      Imagebase:0x2f0000
                                                      File size:59392 bytes
                                                      MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high

                                                      General

                                                      Start time:10:47:54
                                                      Start date:19/01/2021
                                                      Path:C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:'C:\Users\user\AppData\Roaming\hgjgfddsxaz.exe'
                                                      Imagebase:0x300000
                                                      File size:942080 bytes
                                                      MD5 hash:3F350480FD99BD2E9C9B32C9FA1BF4E0
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.592972004.0000000004172000.00000004.00000001.sdmp, Author: Florian Roth
                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.592972004.0000000004172000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.592972004.0000000004172000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.593076062.0000000004205000.00000004.00000001.sdmp, Author: Florian Roth
                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.593076062.0000000004205000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.593076062.0000000004205000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000014.00000002.593637409.000000000439B000.00000004.00000001.sdmp, Author: Florian Roth
                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000014.00000002.593637409.000000000439B000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: NanoCore, Description: unknown, Source: 00000014.00000002.593637409.000000000439B000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                      Antivirus matches:
                                                      • Detection: 34%, Virustotal, Browse
                                                      • Detection: 20%, ReversingLabs
                                                      Reputation:low

                                                      General

                                                      Start time:10:48:30
                                                      Start date:19/01/2021
                                                      Path:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                      Imagebase:0xe00000
                                                      File size:41064 bytes
                                                      MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:.Net C# or VB.NET
                                                      Yara matches:
                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.589229834.00000000042A9000.00000004.00000001.sdmp, Author: Joe Security
                                                      • Rule: NanoCore, Description: unknown, Source: 00000018.00000002.589229834.00000000042A9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000002.580480048.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.580480048.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                                                      • Rule: NanoCore, Description: unknown, Source: 00000018.00000002.580480048.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000002.592742291.00000000058E0000.00000004.00000001.sdmp, Author: Florian Roth
                                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000018.00000002.592742291.00000000058E0000.00000004.00000001.sdmp, Author: Florian Roth
                                                      • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000018.00000002.592779539.0000000005900000.00000004.00000001.sdmp, Author: Florian Roth
                                                      • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000018.00000002.592779539.0000000005900000.00000004.00000001.sdmp, Author: Florian Roth
                                                      • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000018.00000002.592779539.0000000005900000.00000004.00000001.sdmp, Author: Joe Security
                                                      Antivirus matches:
                                                      • Detection: 0%, Virustotal, Browse
                                                      • Detection: 0%, Metadefender, Browse
                                                      • Detection: 0%, ReversingLabs
                                                      Reputation:moderate

                                                      Disassembly

                                                      Code Analysis

                                                      Reset < >