Loading ...

Play interactive tourEdit tour

Analysis Report PO 67542 PDF.exe

Overview

General Information

Sample Name:PO 67542 PDF.exe
Analysis ID:342299
MD5:48e519f4c829c450926294170a30e1bb
SHA1:2427038220c0e5c9ab296467db4ddfcdeb83037d
SHA256:7de0221ea139d8db56886d9f794c167a8d569f9f740e3c353147592a96114648
Tags:exeNanoCoreRATYahoo

Most interesting Screenshot:

Detection

Nanocore
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Malicious sample detected (through community Yara rule)
Yara detected Nanocore RAT
Hides that the sample has been downloaded from the Internet (zone.identifier)
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • PO 67542 PDF.exe (PID: 5036 cmdline: 'C:\Users\user\Desktop\PO 67542 PDF.exe' MD5: 48E519F4C829C450926294170A30E1BB)
    • a.exe (PID: 6784 cmdline: 'C:\Users\user\AppData\Roaming\a.exe' MD5: 48E519F4C829C450926294170A30E1BB)
  • a.exe (PID: 6736 cmdline: 'C:\Users\user\AppData\Roaming\a.exe' MD5: 48E519F4C829C450926294170A30E1BB)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.697095966.0000000004249000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0xdb66f:$x1: NanoCore.ClientPluginHost
  • 0x10e26f:$x1: NanoCore.ClientPluginHost
  • 0x140e5f:$x1: NanoCore.ClientPluginHost
  • 0xdb6ac:$x2: IClientNetworkHost
  • 0x10e2ac:$x2: IClientNetworkHost
  • 0x140e9c:$x2: IClientNetworkHost
  • 0xdf1df:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0x111ddf:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0x1449cf:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000000.00000002.697095966.0000000004249000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000000.00000002.697095966.0000000004249000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0xdb3d7:$a: NanoCore
    • 0xdb3e7:$a: NanoCore
    • 0xdb61b:$a: NanoCore
    • 0xdb62f:$a: NanoCore
    • 0xdb66f:$a: NanoCore
    • 0x10dfd7:$a: NanoCore
    • 0x10dfe7:$a: NanoCore
    • 0x10e21b:$a: NanoCore
    • 0x10e22f:$a: NanoCore
    • 0x10e26f:$a: NanoCore
    • 0x140bc7:$a: NanoCore
    • 0x140bd7:$a: NanoCore
    • 0x140e0b:$a: NanoCore
    • 0x140e1f:$a: NanoCore
    • 0x140e5f:$a: NanoCore
    • 0xdb436:$b: ClientPlugin
    • 0xdb638:$b: ClientPlugin
    • 0xdb678:$b: ClientPlugin
    • 0x10e036:$b: ClientPlugin
    • 0x10e238:$b: ClientPlugin
    • 0x10e278:$b: ClientPlugin
    00000000.00000002.697565797.00000000043DF000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x1061f:$x1: NanoCore.ClientPluginHost
    • 0x43205:$x1: NanoCore.ClientPluginHost
    • 0x1065c:$x2: IClientNetworkHost
    • 0x43242:$x2: IClientNetworkHost
    • 0x1418f:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x46d75:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000000.00000002.697565797.00000000043DF000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 4 entries

      Sigma Overview

      No Sigma rule has matched

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.697095966.0000000004249000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.697565797.00000000043DF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: PO 67542 PDF.exe PID: 5036, type: MEMORY

      Compliance:

      barindex
      Uses 32bit PE filesShow sources
      Source: PO 67542 PDF.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
      Source: PO 67542 PDF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
      Binary contains paths to debug symbolsShow sources
      Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: PO 67542 PDF.exe, 00000000.00000003.666932093.0000000000D90000.00000004.00000001.sdmp, InstallUtil.exe.0.dr
      Source: Binary string: InstallUtil.pdb source: PO 67542 PDF.exe, 00000000.00000003.666932093.0000000000D90000.00000004.00000001.sdmp, InstallUtil.exe.0.dr
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then jmp 028CF60Eh
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then jmp 028C0949h
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then jmp 028CF60Eh
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then jmp 028C0949h
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then push dword ptr [ebp-24h]
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then xor edx, edx
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then push dword ptr [ebp-20h]
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then mov esp, ebp
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then push dword ptr [ebp-24h]
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then push dword ptr [ebp-24h]
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then xor edx, edx
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then xor edx, edx
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then push dword ptr [ebp-20h]
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then push dword ptr [ebp-20h]
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then mov esp, ebp
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 4x nop then jmp 00B50949h
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 4x nop then jmp 00B50949h
      Source: PO 67542 PDF.exe, 00000000.00000003.693229799.0000000000F29000.00000004.00000001.sdmpString found in binary or memory: http://ns.ado/Ident

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.697095966.0000000004249000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.697565797.00000000043DF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: PO 67542 PDF.exe PID: 5036, type: MEMORY

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000000.00000002.697095966.0000000004249000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.697095966.0000000004249000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000000.00000002.697565797.00000000043DF000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000000.00000002.697565797.00000000043DF000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: PO 67542 PDF.exe PID: 5036, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: PO 67542 PDF.exe PID: 5036, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_005C7027
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028C0A48
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028CBB70
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028C9948
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028CF638
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028CD630
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028CEE48
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028C44A0
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028CA440
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028C7450
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028C3D36
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028CBB6F
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028CBB61
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028C993F
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028C9939
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028CD620
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028CF633
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028CEE43
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028CA43F
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028CA431
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_028C9580
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_04EC5250
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_04ECADE8
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_04EC524B
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_04EC4CA0
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_04EC4C9B
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_04ECADDB
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_04ECB8F8
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_04ECB908
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00827027
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_00147027
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_00B59939
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_00B50A38
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_00B5BB61
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_00B54350
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_00B5A431
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_00B57450
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_00B59580
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_00B53D28
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_00B5D68C
      Source: PO 67542 PDF.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
      Source: a.exe.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
      Source: PO 67542 PDF.exe, 00000000.00000002.701746518.0000000008920000.00000002.00000001.sdmpBinary or memory string: originalfilename vs PO 67542 PDF.exe
      Source: PO 67542 PDF.exe, 00000000.00000002.701746518.0000000008920000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs PO 67542 PDF.exe
      Source: PO 67542 PDF.exe, 00000000.00000003.666932093.0000000000D90000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameInstallUtil.exeT vs PO 67542 PDF.exe
      Source: PO 67542 PDF.exe, 00000000.00000002.701584024.0000000008820000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs PO 67542 PDF.exe
      Source: PO 67542 PDF.exe, 00000000.00000002.700978128.0000000007E70000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs PO 67542 PDF.exe
      Source: PO 67542 PDF.exe, 00000000.00000002.696464477.0000000003901000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSHCore1.dll0 vs PO 67542 PDF.exe
      Source: PO 67542 PDF.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 00000000.00000002.697095966.0000000004249000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.697095966.0000000004249000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000000.00000002.697565797.00000000043DF000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000000.00000002.697565797.00000000043DF000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: PO 67542 PDF.exe PID: 5036, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: PO 67542 PDF.exe PID: 5036, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: classification engineClassification label: mal68.troj.evad.winEXE@4/6@0/0
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a.lnkJump to behavior
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to behavior
      Source: PO 67542 PDF.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\AppData\Roaming\a.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\AppData\Roaming\a.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeFile read: C:\Users\user\Desktop\PO 67542 PDF.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\PO 67542 PDF.exe 'C:\Users\user\Desktop\PO 67542 PDF.exe'
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\a.exe 'C:\Users\user\AppData\Roaming\a.exe'
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\a.exe 'C:\Users\user\AppData\Roaming\a.exe'
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess created: C:\Users\user\AppData\Roaming\a.exe 'C:\Users\user\AppData\Roaming\a.exe'
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: PO 67542 PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: PO 67542 PDF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
      Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: PO 67542 PDF.exe, 00000000.00000003.666932093.0000000000D90000.00000004.00000001.sdmp, InstallUtil.exe.0.dr
      Source: Binary string: InstallUtil.pdb source: PO 67542 PDF.exe, 00000000.00000003.666932093.0000000000D90000.00000004.00000001.sdmp, InstallUtil.exe.0.dr
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeCode function: 0_2_04EC3BB4 pushfd ; retf
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to dropped file
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeFile created: C:\Users\user\AppData\Roaming\a.exeJump to dropped file
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a.lnkJump to behavior
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a.lnkJump to behavior

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeFile opened: C:\Users\user\Desktop\PO 67542 PDF.exe\:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\a.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\a.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to dropped file
      Source: C:\Users\user\Desktop\PO 67542 PDF.exe TID: 5888Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\Desktop\PO 67542 PDF.exe TID: 6880Thread sleep count: 148 > 30
      Source: C:\Users\user\Desktop\PO 67542 PDF.exe TID: 1072Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\AppData\Roaming\a.exe TID: 6820Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\AppData\Roaming\a.exe TID: 6676Thread sleep time: -922337203685477s >= -30000s
      Source: a.exe, 00000003.00000002.698214952.00000000024D0000.00000004.00000001.sdmpBinary or memory string: VMware
      Source: a.exe, 00000003.00000002.698214952.00000000024D0000.00000004.00000001.sdmpBinary or memory string: vmware svga
      Source: PO 67542 PDF.exe, 00000000.00000002.700978128.0000000007E70000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: a.exe, 00000003.00000002.698214952.00000000024D0000.00000004.00000001.sdmpBinary or memory string: vmware
      Source: PO 67542 PDF.exe, 00000000.00000002.696464477.0000000003901000.00000004.00000001.sdmp, a.exe, 00000002.00000002.697037922.0000000003BA1000.00000004.00000001.sdmp, a.exe, 00000003.00000002.698214952.00000000024D0000.00000004.00000001.sdmpBinary or memory string: tpautoconnsvc#Microsoft Hyper-V
      Source: PO 67542 PDF.exe, 00000000.00000002.696464477.0000000003901000.00000004.00000001.sdmp, a.exe, 00000002.00000002.697037922.0000000003BA1000.00000004.00000001.sdmp, a.exe, 00000003.00000002.698214952.00000000024D0000.00000004.00000001.sdmpBinary or memory string: cmd.txtQEMUqemu
      Source: PO 67542 PDF.exe, 00000000.00000002.696464477.0000000003901000.00000004.00000001.sdmp, a.exe, 00000002.00000002.697037922.0000000003BA1000.00000004.00000001.sdmp, a.exe, 00000003.00000002.698214952.00000000024D0000.00000004.00000001.sdmpBinary or memory string: vmusrvc
      Source: a.exe, 00000003.00000002.698214952.00000000024D0000.00000004.00000001.sdmpBinary or memory string: vmsrvc
      Source: a.exe, 00000003.00000002.698214952.00000000024D0000.00000004.00000001.sdmpBinary or memory string: vmtools
      Source: a.exe, 00000003.00000002.698214952.00000000024D0000.00000004.00000001.sdmpBinary or memory string: vmware sata5vmware usb pointing device-vmware vmci bus deviceCvmware virtual s scsi disk device
      Source: a.exe, 00000003.00000002.698214952.00000000024D0000.00000004.00000001.sdmpBinary or memory string: vboxservicevbox)Microsoft Virtual PC
      Source: PO 67542 PDF.exe, 00000000.00000002.700978128.0000000007E70000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: PO 67542 PDF.exe, 00000000.00000002.700978128.0000000007E70000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: a.exe, 00000003.00000002.698214952.00000000024D0000.00000004.00000001.sdmpBinary or memory string: virtual-vmware pointing device
      Source: PO 67542 PDF.exe, 00000000.00000002.700978128.0000000007E70000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess token adjusted: Debug
      Source: C:\Users\user\AppData\Roaming\a.exeProcess token adjusted: Debug
      Source: C:\Users\user\AppData\Roaming\a.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeMemory allocated: page read and write | page guard
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeProcess created: C:\Users\user\AppData\Roaming\a.exe 'C:\Users\user\AppData\Roaming\a.exe'
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeQueries volume information: C:\Users\user\Desktop\PO 67542 PDF.exe VolumeInformation
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\a.exeQueries volume information: C:\Users\user\AppData\Roaming\a.exe VolumeInformation
      Source: C:\Users\user\AppData\Roaming\a.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\a.exeQueries volume information: C:\Users\user\AppData\Roaming\a.exe VolumeInformation
      Source: C:\Users\user\AppData\Roaming\a.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\PO 67542 PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.697095966.0000000004249000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.697565797.00000000043DF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: PO 67542 PDF.exe PID: 5036, type: MEMORY

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: PO 67542 PDF.exe, 00000000.00000002.697565797.00000000043DF000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000000.00000002.697095966.0000000004249000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.697565797.00000000043DF000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: PO 67542 PDF.exe PID: 5036, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationStartup Items1Startup Items1Masquerading1OS Credential DumpingQuery Registry1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobRegistry Run Keys / Startup Folder2Process Injection11Virtualization/Sandbox Evasion3LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothRemote Access Software1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Registry Run Keys / Startup Folder2Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion3SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection11NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptHidden Files and Directories1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information2Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      No Antivirus matches

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%MetadefenderBrowse
      C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%ReversingLabs

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://ns.ado/Ident0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      No contacted domains info

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://ns.ado/IdentPO 67542 PDF.exe, 00000000.00000003.693229799.0000000000F29000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown

      Contacted IPs

      No contacted IP infos

      General Information

      Joe Sandbox Version:31.0.0 Red Diamond
      Analysis ID:342299
      Start date:20.01.2021
      Start time:18:45:50
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 8m 31s
      Hypervisor based Inspection enabled:false
      Report type:light
      Sample file name:PO 67542 PDF.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:16
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal68.troj.evad.winEXE@4/6@0/0
      EGA Information:Failed
      HDC Information:
      • Successful, ratio: 1.1% (good quality ratio 0.9%)
      • Quality average: 63.2%
      • Quality standard deviation: 31.1%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • Found application associated with file extension: .exe
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtReadVirtualMemory calls found.
      • VT rate limit hit for: /opt/package/joesandbox/database/analysis/342299/sample/PO 67542 PDF.exe

      Simulations

      Behavior and APIs

      TimeTypeDescription
      18:46:48AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a.lnk

      Joe Sandbox View / Context

      IPs

      No context

      Domains

      No context

      ASN

      No context

      JA3 Fingerprints

      No context

      Dropped Files

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      C:\Users\user\AppData\Local\Temp\InstallUtil.exeMi9eI6wu1p.exeGet hashmaliciousBrowse
        OJ4zX7G77Y.exeGet hashmaliciousBrowse
          IMG_50781.pdf.exeGet hashmaliciousBrowse
            IMG_25579.pdf.exeGet hashmaliciousBrowse
              IMG_40317.pdf.exeGet hashmaliciousBrowse
                PO#4018-308875.pdf.exeGet hashmaliciousBrowse
                  SecuriteInfo.com.Trojan.PackedNET.509.8504.exeGet hashmaliciousBrowse
                    IMG_80137.pdf.exeGet hashmaliciousBrowse
                      Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousBrowse
                        MEDUSI492126.pdf.exeGet hashmaliciousBrowse
                          2GNCGUZ6JU.exeGet hashmaliciousBrowse
                            IMG_53771.pdf.exeGet hashmaliciousBrowse
                              SecuriteInfo.com.Generic.mg.fb5363e0cae04979.exeGet hashmaliciousBrowse
                                Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousBrowse
                                  silkOrder00110.pdf.exeGet hashmaliciousBrowse
                                    74725794.exeGet hashmaliciousBrowse
                                      74725794.exeGet hashmaliciousBrowse
                                        IMG_53091.pdf.exeGet hashmaliciousBrowse
                                          IMG_71103.pdf.exeGet hashmaliciousBrowse
                                            WjIKk3FzeI.exeGet hashmaliciousBrowse

                                              Created / dropped Files

                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO 67542 PDF.exe.log
                                              Process:C:\Users\user\Desktop\PO 67542 PDF.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):1451
                                              Entropy (8bit):5.345862727722058
                                              Encrypted:false
                                              SSDEEP:24:ML9E4Ks2eE4O1lEE4UVwPKDE4KhK3VZ9pKhuE4IWUAE4KI6no84G1qE4j:MxHKXeHKlEHU0YHKhQnouHIW7HKjovGm
                                              MD5:06F54CDBFEF62849AF5AE052722BD7B6
                                              SHA1:FB0250AAC2057D0B5BCE4CE130891E428F28DA05
                                              SHA-256:4C039B93A728B546F49C47ED8B448D40A3553CDAABB147067AEE3958133CB446
                                              SHA-512:34EF5F6D5EAB0E5B11AC81F0D72FC56304291EDEEF6D19DF7145FDECAB5D342767DBBC0B4384B8DECB5741E6B85A4B431DF14FBEB5DDF2DEE103064D2895EABB
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                                              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\a.exe.log
                                              Process:C:\Users\user\AppData\Roaming\a.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1362
                                              Entropy (8bit):5.343186145897752
                                              Encrypted:false
                                              SSDEEP:24:ML9E4Ks2eE4O1lEE4UVwPKDE4KhK3VZ9pKhuE4IWUAE4KI6no84j:MxHKXeHKlEHU0YHKhQnouHIW7HKjovj
                                              MD5:1249251E90A1C28AB8F7235F30056DEB
                                              SHA1:166BA6B64E9B0D9BA7B856334F7D7EC027030BA1
                                              SHA-256:B5D65BF3581136CD5368BC47FA3972E06F526EED407BC6571D11D9CD4B5C4D83
                                              SHA-512:FD880C5B12B22241F67139ABD09B99ACE7A4DD24635FC6B340A3E7C463E2AEF3FA68EF647352132934BC1F8CA134F46064049449ACB67954BEDDEA9AA9670885
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                                              C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                              Process:C:\Users\user\Desktop\PO 67542 PDF.exe
                                              File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):41064
                                              Entropy (8bit):6.164873449128079
                                              Encrypted:false
                                              SSDEEP:384:FtpFVLK0MsihB9VKS7xdgE7KJ9Yl6dnPU3SERztmbqCJstdMardz/JikPZ+sPZTd:ZBMs2SqdD86Iq8gZZFyViML3an
                                              MD5:EFEC8C379D165E3F33B536739AEE26A3
                                              SHA1:C875908ACBA5CAC1E0B40F06A83F0F156A2640FA
                                              SHA-256:46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
                                              SHA-512:497847EC115D9AF78899E6DC20EC32A60B16954F83CF5169A23DD3F1459CB632DAC95417BD898FD1895C9FE2262FCBF7838FCF6919FB3B851A0557FBE07CCFFA
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: Metadefender, Detection: 0%, Browse
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Joe Sandbox View:
                                              • Filename: Mi9eI6wu1p.exe, Detection: malicious, Browse
                                              • Filename: OJ4zX7G77Y.exe, Detection: malicious, Browse
                                              • Filename: IMG_50781.pdf.exe, Detection: malicious, Browse
                                              • Filename: IMG_25579.pdf.exe, Detection: malicious, Browse
                                              • Filename: IMG_40317.pdf.exe, Detection: malicious, Browse
                                              • Filename: PO#4018-308875.pdf.exe, Detection: malicious, Browse
                                              • Filename: SecuriteInfo.com.Trojan.PackedNET.509.8504.exe, Detection: malicious, Browse
                                              • Filename: IMG_80137.pdf.exe, Detection: malicious, Browse
                                              • Filename: Ziraat Bankasi Swift Mesaji.exe, Detection: malicious, Browse
                                              • Filename: MEDUSI492126.pdf.exe, Detection: malicious, Browse
                                              • Filename: 2GNCGUZ6JU.exe, Detection: malicious, Browse
                                              • Filename: IMG_53771.pdf.exe, Detection: malicious, Browse
                                              • Filename: SecuriteInfo.com.Generic.mg.fb5363e0cae04979.exe, Detection: malicious, Browse
                                              • Filename: Ziraat Bankasi Swift Mesaji.exe, Detection: malicious, Browse
                                              • Filename: silkOrder00110.pdf.exe, Detection: malicious, Browse
                                              • Filename: 74725794.exe, Detection: malicious, Browse
                                              • Filename: 74725794.exe, Detection: malicious, Browse
                                              • Filename: IMG_53091.pdf.exe, Detection: malicious, Browse
                                              • Filename: IMG_71103.pdf.exe, Detection: malicious, Browse
                                              • Filename: WjIKk3FzeI.exe, Detection: malicious, Browse
                                              Reputation:moderate, very likely benign file
                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z..............0..T...........r... ........@.. ....................................`.................................4r..O....................b..h>...........p............................................... ............... ..H............text....R... ...T.................. ..`.rsrc................V..............@..@.reloc...............`..............@..B................hr......H........"..|J..........lm.......o......................................2~.....o....*.r...p(....*VrK..p(....s.........*..0..........(....(....o....o....(....o.... .....T(....o....(....o....o ...o!....4(....o....(....o....o ...o".....(....rm..ps#...o....($........(%....o&....ry..p......%.r...p.%.(.....(....('....((.......o)...('........*.*................"..(*...*..{Q...-...}Q.....(+...(....(,....(+...*"..(-...*..(....*..(.....r...p.(/...o0...s....}T...*....0.. .......~S...-.s
                                              C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a.lnk
                                              Process:C:\Users\user\Desktop\PO 67542 PDF.exe
                                              File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                                              Category:dropped
                                              Size (bytes):854
                                              Entropy (8bit):3.0159112944533297
                                              Encrypted:false
                                              SSDEEP:12:8wl0RsXowAOcQ/tz0/CSLm9RKMJkHgTCNfBT/v4t2Y+xIBjK:8iLDWLYr+Vpd7aB
                                              MD5:CDE31B0A7CA104AEE6CB2FF9ABFED71F
                                              SHA1:B92338857A61560D0E667E6E3EB5B9CCF22CE260
                                              SHA-256:A835B03B57A7941B592CCF6825F308CDA3158A53B4B798B0E14C51D3E9DB1AB1
                                              SHA-512:AF3C36C759A831D5366F2493A4AAF7BA2A97181D098C4E2D2394F06BC379A3D947A8D2BFCFDA2ADE9C3D6AC44B0895C0E4470AA8AECF1D960C7424E2E6FAE99D
                                              Malicious:false
                                              Reputation:low
                                              Preview: L..................F.............................................................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....P.2...........a.exe.<............................................a...e.x.e.............\.....\.....\.....\.....\.a...e.x.e.$.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.a...e.x.e.............y.............>.e.L.:..er.=y...............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.................
                                              C:\Users\user\AppData\Roaming\a.exe
                                              Process:C:\Users\user\Desktop\PO 67542 PDF.exe
                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):660480
                                              Entropy (8bit):5.42908513626469
                                              Encrypted:false
                                              SSDEEP:6144:kM/y50jRVCdT3/ceLDcLuZTv8ybPoUy2i69LP+LYrAo23KB2pTwcSn9vCfEvg4zn:JK50jwcEc6tWUtZ9LAYT23d9ZSn9Vd
                                              MD5:48E519F4C829C450926294170A30E1BB
                                              SHA1:2427038220C0E5C9AB296467DB4DDFCDEB83037D
                                              SHA-256:7DE0221EA139D8DB56886D9F794C167A8D569F9F740E3C353147592A96114648
                                              SHA-512:ED305050F3CF248672D14FF868443FCF04ADD6CAE9FEA4BDE0A6B98454B503CD56ACB0BE26B7DC3F3C96AC638A44227FBD129550A7AE069388C25DDCD1DEDEC9
                                              Malicious:false
                                              Reputation:low
                                              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...m..2..............P.............N&... ...@....@.. ....................................`..................................%..S....@..B....................`....................................................... ............... ..H............text...T.... ...................... ..`.rsrc...B....@......................@..@.reloc.......`......................@..B................0&......H...........dP......8........6..........................................&..(.....*.s.........s.........s.........s ........*&........*".......*Vs....(3...t.........*..(4...*:.......(.....*...(.......}......}......}.......}.......}....*:.......($....*..*....u....Q..P-..u....+..Q..P-..P-..u....+..Q*..(....*..~....r...poF...tI...t....o1....*..(S...*..(V...*.0...........................................o@...u;...-D.(....t................oA...u....(....t........o@...u.............+
                                              C:\Users\user\AppData\Roaming\a.exe:Zone.Identifier
                                              Process:C:\Users\user\Desktop\PO 67542 PDF.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):26
                                              Entropy (8bit):3.95006375643621
                                              Encrypted:false
                                              SSDEEP:3:ggPYV:rPYV
                                              MD5:187F488E27DB4AF347237FE461A079AD
                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview: [ZoneTransfer]....ZoneId=0

                                              Static File Info

                                              General

                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):5.42908513626469
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Windows Screen Saver (13104/52) 0.07%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              File name:PO 67542 PDF.exe
                                              File size:660480
                                              MD5:48e519f4c829c450926294170a30e1bb
                                              SHA1:2427038220c0e5c9ab296467db4ddfcdeb83037d
                                              SHA256:7de0221ea139d8db56886d9f794c167a8d569f9f740e3c353147592a96114648
                                              SHA512:ed305050f3cf248672d14ff868443fcf04add6cae9fea4bde0a6b98454b503cd56acb0be26b7dc3f3c96ac638a44227fbd129550a7ae069388c25ddcd1dedec9
                                              SSDEEP:6144:kM/y50jRVCdT3/ceLDcLuZTv8ybPoUy2i69LP+LYrAo23KB2pTwcSn9vCfEvg4zn:JK50jwcEc6tWUtZ9LAYT23d9ZSn9Vd
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...m..2..............P.............N&... ...@....@.. ....................................`................................

                                              File Icon

                                              Icon Hash:00828e8e8686b000

                                              Static PE Info

                                              General

                                              Entrypoint:0x4a264e
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                              Time Stamp:0x3217906D [Sun Aug 18 21:51:41 1996 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:v4.0.30319
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                              Entrypoint Preview

                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al

                                              Data Directories

                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xa25f80x53.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xa40000x642.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xa60000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                              Sections

                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000xa06540xa0800False0.521245558314data5.43642675992IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                              .rsrc0xa40000x6420x800False0.35888671875data3.71514384495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0xa60000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                              Resources

                                              NameRVASizeTypeLanguageCountry
                                              RT_VERSION0xa40a00x3b8COM executable for DOS
                                              RT_MANIFEST0xa44580x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                              Imports

                                              DLLImport
                                              mscoree.dll_CorExeMain

                                              Version Infos

                                              DescriptionData
                                              Translation0x0000 0x04b0
                                              LegalCopyrightCopyright 2018 7D393E<CA=6J@A@DGF>CD<<B
                                              Assembly Version1.0.0.0
                                              InternalNamePO 67542 PDF.exe
                                              FileVersion9.14.19.24
                                              CompanyName7D393E<CA=6J@A@DGF>CD<<B
                                              CommentsC@7?G5:2B@8:B<G<:?C@<B:6
                                              ProductName7?E4FID7<633G9>
                                              ProductVersion9.14.19.24
                                              FileDescription7?E4FID7<633G9>
                                              OriginalFilenamePO 67542 PDF.exe

                                              Network Behavior

                                              No network behavior found

                                              Code Manipulations

                                              Statistics

                                              Behavior

                                              Click to jump to process

                                              System Behavior

                                              General

                                              Start time:18:46:41
                                              Start date:20/01/2021
                                              Path:C:\Users\user\Desktop\PO 67542 PDF.exe
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Users\user\Desktop\PO 67542 PDF.exe'
                                              Imagebase:0x5c0000
                                              File size:660480 bytes
                                              MD5 hash:48E519F4C829C450926294170A30E1BB
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Yara matches:
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.697095966.0000000004249000.00000004.00000001.sdmp, Author: Florian Roth
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.697095966.0000000004249000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.697095966.0000000004249000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.697565797.00000000043DF000.00000004.00000001.sdmp, Author: Florian Roth
                                              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.697565797.00000000043DF000.00000004.00000001.sdmp, Author: Joe Security
                                              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.697565797.00000000043DF000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                              Reputation:low

                                              General

                                              Start time:18:46:56
                                              Start date:20/01/2021
                                              Path:C:\Users\user\AppData\Roaming\a.exe
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Users\user\AppData\Roaming\a.exe'
                                              Imagebase:0x820000
                                              File size:660480 bytes
                                              MD5 hash:48E519F4C829C450926294170A30E1BB
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Reputation:low

                                              General

                                              Start time:18:46:59
                                              Start date:20/01/2021
                                              Path:C:\Users\user\AppData\Roaming\a.exe
                                              Wow64 process (32bit):true
                                              Commandline:'C:\Users\user\AppData\Roaming\a.exe'
                                              Imagebase:0x140000
                                              File size:660480 bytes
                                              MD5 hash:48E519F4C829C450926294170A30E1BB
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:.Net C# or VB.NET
                                              Reputation:low

                                              Disassembly

                                              Code Analysis

                                              Reset < >