Loading ...

Play interactive tourEdit tour

Analysis Report PO#4018-308875.exe

Overview

General Information

Sample Name:PO#4018-308875.exe
Analysis ID:342480
MD5:37bb301570706e9b086c26c16e7cdb83
SHA1:9ff8d1dcca0c34f62113cd7f0a5028923299cd27
SHA256:4e599dda2d5d0f3cad7ac5451a39cb1c4934ea0f10fd9163e82711455aaf3efd
Tags:exe

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: NanoCore
Yara detected Nanocore RAT
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Uses dynamic DNS services
Writes to foreign memory regions
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses reg.exe to modify the Windows registry
Yara signature match

Classification

Startup

  • System is w10x64
  • PO#4018-308875.exe (PID: 4780 cmdline: 'C:\Users\user\Desktop\PO#4018-308875.exe' MD5: 37BB301570706E9B086C26C16E7CDB83)
    • cmd.exe (PID: 3220 cmdline: 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'vsg63637' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\edjdjdn.exe' MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • conhost.exe (PID: 1440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • reg.exe (PID: 5760 cmdline: REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'vsg63637' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\edjdjdn.exe' MD5: CEE2A7E57DF2A159A065A34913A055C2)
    • edjdjdn.exe (PID: 2016 cmdline: 'C:\Users\user\AppData\Roaming\edjdjdn.exe' MD5: 37BB301570706E9B086C26C16E7CDB83)
      • InstallUtil.exe (PID: 5480 cmdline: C:\Users\user\AppData\Local\Temp\InstallUtil.exe MD5: EFEC8C379D165E3F33B536739AEE26A3)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"C2: ": ["185.162.88.26", "185.162.88.26:2091"], "Version: ": "NanoCore Client, Version=1.2.2.0"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
0000000E.00000002.1087650939.000000000424A000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x11007:$x1: NanoCore.ClientPluginHost
  • 0x43bbd:$x1: NanoCore.ClientPluginHost
  • 0x11044:$x2: IClientNetworkHost
  • 0x43bfa:$x2: IClientNetworkHost
  • 0x14b77:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0x4772d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
0000000E.00000002.1087650939.000000000424A000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    0000000E.00000002.1087650939.000000000424A000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x10d6f:$a: NanoCore
    • 0x10d7f:$a: NanoCore
    • 0x10fb3:$a: NanoCore
    • 0x10fc7:$a: NanoCore
    • 0x11007:$a: NanoCore
    • 0x43925:$a: NanoCore
    • 0x43935:$a: NanoCore
    • 0x43b69:$a: NanoCore
    • 0x43b7d:$a: NanoCore
    • 0x43bbd:$a: NanoCore
    • 0x10dce:$b: ClientPlugin
    • 0x10fd0:$b: ClientPlugin
    • 0x11010:$b: ClientPlugin
    • 0x43984:$b: ClientPlugin
    • 0x43b86:$b: ClientPlugin
    • 0x43bc6:$b: ClientPlugin
    • 0x10ef5:$c: ProjectData
    • 0x43aab:$c: ProjectData
    • 0x118fc:$d: DESCrypto
    • 0x444b2:$d: DESCrypto
    • 0x192c8:$e: KeepAlive
    0000000E.00000002.1087171564.00000000040B4000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xdc117:$x1: NanoCore.ClientPluginHost
    • 0x10ece7:$x1: NanoCore.ClientPluginHost
    • 0x1418a7:$x1: NanoCore.ClientPluginHost
    • 0xdc154:$x2: IClientNetworkHost
    • 0x10ed24:$x2: IClientNetworkHost
    • 0x1418e4:$x2: IClientNetworkHost
    • 0xdfc87:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x112857:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x145417:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    0000000E.00000002.1087171564.00000000040B4000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 29 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      19.2.InstallUtil.exe.4e10000.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xe75:$x1: NanoCore.ClientPluginHost
      • 0xe8f:$x2: IClientNetworkHost
      19.2.InstallUtil.exe.4e10000.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xe75:$x2: NanoCore.ClientPluginHost
      • 0x1261:$s3: PipeExists
      • 0x1136:$s4: PipeCreated
      • 0xeb0:$s5: IClientLoggingHost
      19.2.InstallUtil.exe.5040000.6.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xf7ad:$x1: NanoCore.ClientPluginHost
      • 0xf7da:$x2: IClientNetworkHost
      19.2.InstallUtil.exe.5040000.6.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xf7ad:$x2: NanoCore.ClientPluginHost
      • 0x10888:$s4: PipeCreated
      • 0xf7c7:$s5: IClientLoggingHost
      19.2.InstallUtil.exe.5040000.6.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        Click to see the 7 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\InstallUtil.exe, ProcessId: 5480, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: InstallUtil.exe.5480.19.memstrMalware Configuration Extractor: NanoCore {"C2: ": ["185.162.88.26", "185.162.88.26:2091"], "Version: ": "NanoCore Client, Version=1.2.2.0"}
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000E.00000002.1087650939.000000000424A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.1087171564.00000000040B4000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.782898982.0000000004AC7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.783786131.0000000004C5D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.1082965333.00000000035A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.1078429432.0000000000422000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.1087119513.0000000005040000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.1086961721.0000000004021000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: edjdjdn.exe PID: 2016, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5480, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: PO#4018-308875.exe PID: 4780, type: MEMORY
        Source: Yara matchFile source: 19.2.InstallUtil.exe.5040000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.InstallUtil.exe.5040000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.InstallUtil.exe.420000.1.unpack, type: UNPACKEDPE
        Source: 19.2.InstallUtil.exe.420000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 19.2.InstallUtil.exe.5040000.6.unpackAvira: Label: TR/NanoCore.fadte

        Compliance:

        barindex
        Uses 32bit PE filesShow sources
        Source: PO#4018-308875.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
        Source: PO#4018-308875.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
        Binary contains paths to debug symbolsShow sources
        Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: InstallUtil.exe, 00000013.00000000.857139795.0000000000052000.00000002.00020000.sdmp, InstallUtil.exe.0.dr
        Source: Binary string: InstallUtil.pdb source: InstallUtil.exe, InstallUtil.exe.0.dr
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov esp, ebp
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then push dword ptr [ebp-24h]
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then push dword ptr [ebp-20h]
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then jmp 059F2026h
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then push dword ptr [ebp-24h]
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then xor edx, edx
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then xor edx, edx
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then push dword ptr [ebp-20h]
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 4x nop then push dword ptr [ebp-24h]
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 4x nop then jmp 04F22026h
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 4x nop then push dword ptr [ebp-20h]
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 4x nop then push dword ptr [ebp-24h]
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 4x nop then xor edx, edx
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 4x nop then xor edx, edx
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 4x nop then push dword ptr [ebp-20h]
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorIPs: 185.162.88.26
        Source: Malware configuration extractorIPs: 185.162.88.26:2091
        Uses dynamic DNS servicesShow sources
        Source: unknownDNS query: name: fenixalec.ddns.net
        Source: global trafficTCP traffic: 192.168.2.4:49763 -> 185.162.88.26:20911
        Source: Joe Sandbox ViewIP Address: 185.162.88.26 185.162.88.26
        Source: Joe Sandbox ViewASN Name: AS40676US AS40676US
        Source: unknownDNS traffic detected: queries for: fenixalec.ddns.net
        Source: PO#4018-308875.exe, 00000000.00000002.781295935.0000000001578000.00000004.00000020.sdmpString found in binary or memory: http://crl.micros:
        Source: edjdjdn.exe, 0000000E.00000002.1079742606.0000000000BA9000.00000004.00000040.sdmpString found in binary or memory: http://iptc.tc4xmp
        Source: PO#4018-308875.exe, 00000000.00000002.781552925.0000000001699000.00000004.00000040.sdmpString found in binary or memory: http://ns.ado/IdentB
        Source: PO#4018-308875.exe, 00000000.00000002.781113925.00000000014A0000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: InstallUtil.exe, 00000013.00000002.1082965333.00000000035A9000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000E.00000002.1087650939.000000000424A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.1087171564.00000000040B4000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.782898982.0000000004AC7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.783786131.0000000004C5D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.1082965333.00000000035A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.1078429432.0000000000422000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.1087119513.0000000005040000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.1086961721.0000000004021000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: edjdjdn.exe PID: 2016, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5480, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: PO#4018-308875.exe PID: 4780, type: MEMORY
        Source: Yara matchFile source: 19.2.InstallUtil.exe.5040000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.InstallUtil.exe.5040000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.InstallUtil.exe.420000.1.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 0000000E.00000002.1087650939.000000000424A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000E.00000002.1087650939.000000000424A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000E.00000002.1087171564.00000000040B4000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000E.00000002.1087171564.00000000040B4000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.782898982.0000000004AC7000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.782898982.0000000004AC7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000002.1086796443.0000000004E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.783786131.0000000004C5D000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.783786131.0000000004C5D000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000002.1082965333.00000000035A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000002.1078429432.0000000000422000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000013.00000002.1078429432.0000000000422000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000013.00000002.1087119513.0000000005040000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000E.00000002.1086961721.0000000004021000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000E.00000002.1086961721.0000000004021000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: edjdjdn.exe PID: 2016, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: edjdjdn.exe PID: 2016, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: InstallUtil.exe PID: 5480, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: InstallUtil.exe PID: 5480, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: PO#4018-308875.exe PID: 4780, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: PO#4018-308875.exe PID: 4780, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 19.2.InstallUtil.exe.4e10000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.InstallUtil.exe.5040000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.InstallUtil.exe.5040000.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.InstallUtil.exe.420000.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 19.2.InstallUtil.exe.420000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        .NET source code contains very large array initializationsShow sources
        Source: PO#4018-308875.exe, Wp9/b4J.csLarge array initialization: .cctor: array initializer size 2491
        Source: edjdjdn.exe.0.dr, Wp9/b4J.csLarge array initialization: .cctor: array initializer size 2491
        Source: 0.2.PO#4018-308875.exe.d10000.0.unpack, Wp9/b4J.csLarge array initialization: .cctor: array initializer size 2491
        Source: 0.0.PO#4018-308875.exe.d10000.0.unpack, Wp9/b4J.csLarge array initialization: .cctor: array initializer size 2491
        Source: 14.0.edjdjdn.exe.340000.0.unpack, Wp9/b4J.csLarge array initialization: .cctor: array initializer size 2491
        Initial sample is a PE file and has a suspicious nameShow sources
        Source: initial sampleStatic PE information: Filename: PO#4018-308875.exe
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE3F34 CreateProcessAsUserW,
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_0167DA00
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_0167C2CF
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_01675728
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_0167B7D8
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_01678E50
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_01675EA0
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_059FD468
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_059F2050
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_059F0040
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_059F7DF5
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_059F1850
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_059F7493
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_059F74A0
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_059FD458
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_059F0006
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_059F2040
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_059FDF79
        Source: C:\Users\user\Desktop\PO#4018-308875.exeCode function: 0_2_059F7E2C
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_00B7C2CF
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_00B7DA00
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_00B75EA0
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_00B78E50
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_00B7B7D8
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_00B75728
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04F2F678
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04F22050
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04F20040
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04F2D140
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04F2EC90
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04F27E37
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04F21850
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04F274A0
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04F27491
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04F2F668
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04F22040
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04F20006
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04F2D130
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04F2EC80
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE4498
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE0040
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE6D38
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE2230
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE1B00
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE4489
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE3810
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE0007
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE3800
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE7958
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE6D28
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE1AF1
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE2220
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE5BE0
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE3398
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE3388
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeCode function: 14_2_04FE4F20
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 19_2_000520B0
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 19_2_04ACE480
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 19_2_04ACE471
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeCode function: 19_2_04ACBBD4
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\InstallUtil.exe 46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
        Source: PO#4018-308875.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: edjdjdn.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: PO#4018-308875.exe, 00000000.00000002.789163393.0000000008D90000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs PO#4018-308875.exe
        Source: PO#4018-308875.exe, 00000000.00000002.786763274.00000000059C0000.00000002.00000001.sdmpBinary or memory string: originalfilename vs PO#4018-308875.exe
        Source: PO#4018-308875.exe, 00000000.00000002.786763274.00000000059C0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs PO#4018-308875.exe
        Source: PO#4018-308875.exe, 00000000.00000002.780768124.0000000000E1C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameICQSetup.exe2 vs PO#4018-308875.exe
        Source: PO#4018-308875.exe, 00000000.00000002.782452982.0000000004181000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSHCore1.dll0 vs PO#4018-308875.exe
        Source: PO#4018-308875.exe, 00000000.00000002.781113925.00000000014A0000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PO#4018-308875.exe
        Source: PO#4018-308875.exe, 00000000.00000002.786471639.00000000058B0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs PO#4018-308875.exe
        Source: PO#4018-308875.exeBinary or memory string: OriginalFilenameICQSetup.exe2 vs PO#4018-308875.exe
        Source: PO#4018-308875.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'vsg63637' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\edjdjdn.exe'
        Source: 0000000E.00000002.1087650939.000000000424A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000E.00000002.1087650939.000000000424A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000E.00000002.1087171564.00000000040B4000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000E.00000002.1087171564.00000000040B4000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.782898982.0000000004AC7000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.782898982.0000000004AC7000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000002.1086796443.0000000004E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000013.00000002.1086796443.0000000004E10000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000000.00000002.783786131.0000000004C5D000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.783786131.0000000004C5D000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000002.1082965333.00000000035A9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000002.1078429432.0000000000422000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000013.00000002.1078429432.0000000000422000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000013.00000002.1087119513.0000000005040000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000013.00000002.1087119513.0000000005040000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000000E.00000002.1086961721.0000000004021000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000E.00000002.1086961721.0000000004021000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: edjdjdn.exe PID: 2016, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: edjdjdn.exe PID: 2016, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: InstallUtil.exe PID: 5480, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: InstallUtil.exe PID: 5480, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: PO#4018-308875.exe PID: 4780, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: PO#4018-308875.exe PID: 4780, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.InstallUtil.exe.4e10000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.InstallUtil.exe.4e10000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 19.2.InstallUtil.exe.5040000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.InstallUtil.exe.5040000.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 19.2.InstallUtil.exe.5040000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.InstallUtil.exe.5040000.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 19.2.InstallUtil.exe.420000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 19.2.InstallUtil.exe.420000.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 19.2.InstallUtil.exe.420000.1.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 19.2.InstallUtil.exe.420000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 19.2.InstallUtil.exe.420000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 19.2.InstallUtil.exe.420000.1.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: classification engineClassification label: mal100.troj.evad.winEXE@10/5@10/2
        Source: C:\Users\user\Desktop\PO#4018-308875.exeFile created: C:\Users\user\AppData\Roaming\edjdjdn.exeJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{4c844ad7-de78-4c04-815b-d468ebb89811}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1440:120:WilError_01
        Source: C:\Users\user\Desktop\PO#4018-308875.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to behavior
        Source: PO#4018-308875.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\PO#4018-308875.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\PO#4018-308875.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\PO#4018-308875.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: C:\Users\user\Desktop\PO#4018-308875.exeFile read: C:\Users\user\Desktop\PO#4018-308875.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\PO#4018-308875.exe 'C:\Users\user\Desktop\PO#4018-308875.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'vsg63637' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\edjdjdn.exe'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'vsg63637' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\edjdjdn.exe'
        Source: unknownProcess created: C:\Users\user\AppData\Roaming\edjdjdn.exe 'C:\Users\user\AppData\Roaming\edjdjdn.exe'
        Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'vsg63637' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\edjdjdn.exe'
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess created: C:\Users\user\AppData\Roaming\edjdjdn.exe 'C:\Users\user\AppData\Roaming\edjdjdn.exe'
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'vsg63637' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\edjdjdn.exe'
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
        Source: C:\Users\user\Desktop\PO#4018-308875.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
        Source: C:\Users\user\Desktop\PO#4018-308875.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: PO#4018-308875.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: PO#4018-308875.exeStatic file information: File size 1103872 > 1048576
        Source: PO#4018-308875.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
        Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: InstallUtil.exe, 00000013.00000000.857139795.0000000000052000.00000002.00020000.sdmp, InstallUtil.exe.0.dr
        Source: Binary string: InstallUtil.pdb source: InstallUtil.exe, InstallUtil.exe.0.dr

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 19.2.InstallUtil.exe.420000.1.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.2.InstallUtil.exe.420000.1.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 19.2.InstallUtil.exe.420000.1.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 19.2.InstallUtil.exe.420000.1.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: C:\Users\user\Desktop\PO#4018-308875.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to dropped file
        Source: C:\Users\user\Desktop\PO#4018-308875.exeFile created: C:\Users\user\AppData\Roaming\edjdjdn.exeJump to dropped file
        Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run vsg63637Jump to behavior
        Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run vsg63637Jump to behavior

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\PO#4018-308875.exeFile opened: C:\Users\user\Desktop\PO#4018-308875.exe\:Zone.Identifier read attributes | delete
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeFile opened: C:\Users\user\AppData\Roaming\edjdjdn.exe\:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\PO#4018-308875.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\PO#4018-308875.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\PO#4018-308875.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\PO#4018-308875.exeWindow / User API: threadDelayed 3472
        Source: C:\Users\user\Desktop\PO#4018-308875.exeWindow / User API: threadDelayed 6301
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeWindow / User API: threadDelayed 1182
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeWindow / User API: threadDelayed 8663
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: threadDelayed 1530
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: threadDelayed 8087
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeWindow / User API: foregroundWindowGot 798
        Source: C:\Users\user\Desktop\PO#4018-308875.exe TID: 5804Thread sleep time: -23058430092136925s >= -30000s
        Source: C:\Users\user\Desktop\PO#4018-308875.exe TID: 5804Thread sleep time: -30000s >= -30000s
        Source: C:\Users\user\Desktop\PO#4018-308875.exe TID: 2848Thread sleep count: 3472 > 30
        Source: C:\Users\user\Desktop\PO#4018-308875.exe TID: 2848Thread sleep count: 6301 > 30
        Source: C:\Users\user\Desktop\PO#4018-308875.exe TID: 5804Thread sleep count: 35 > 30
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exe TID: 4812Thread sleep time: -18446744073709540s >= -30000s
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exe TID: 4812Thread sleep time: -30000s >= -30000s
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exe TID: 4996Thread sleep count: 1182 > 30
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exe TID: 4996Thread sleep count: 8663 > 30
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exe TID: 5648Thread sleep time: -5534023222112862s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: edjdjdn.exe, 0000000E.00000002.1080195980.0000000002730000.00000004.00000001.sdmpBinary or memory string: VMware
        Source: edjdjdn.exe, 0000000E.00000002.1080195980.0000000002730000.00000004.00000001.sdmpBinary or memory string: vmware svga
        Source: PO#4018-308875.exe, 00000000.00000002.781248980.0000000001526000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{e6e9dfd8-98f2-11e9-90ce-806e6f6e6963}\DosDevices\D:
        Source: PO#4018-308875.exe, 00000000.00000002.786471639.00000000058B0000.00000002.00000001.sdmp, InstallUtil.exe, 00000013.00000002.1087466820.00000000060C0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: edjdjdn.exe, 0000000E.00000002.1080195980.0000000002730000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: PO#4018-308875.exe, 00000000.00000002.782452982.0000000004181000.00000004.00000001.sdmp, edjdjdn.exe, 0000000E.00000002.1080195980.0000000002730000.00000004.00000001.sdmpBinary or memory string: tpautoconnsvc#Microsoft Hyper-V
        Source: PO#4018-308875.exe, 00000000.00000002.782452982.0000000004181000.00000004.00000001.sdmp, edjdjdn.exe, 0000000E.00000002.1080195980.0000000002730000.00000004.00000001.sdmpBinary or memory string: cmd.txtQEMUqemu
        Source: PO#4018-308875.exe, 00000000.00000002.782452982.0000000004181000.00000004.00000001.sdmp, edjdjdn.exe, 0000000E.00000002.1080195980.0000000002730000.00000004.00000001.sdmpBinary or memory string: vmusrvc
        Source: edjdjdn.exe, 0000000E.00000002.1080195980.0000000002730000.00000004.00000001.sdmpBinary or memory string: vmsrvc
        Source: edjdjdn.exe, 0000000E.00000002.1080195980.0000000002730000.00000004.00000001.sdmpBinary or memory string: vmtools
        Source: PO#4018-308875.exe, 00000000.00000002.781248980.0000000001526000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\.;9.o7
        Source: edjdjdn.exe, 0000000E.00000002.1080195980.0000000002730000.00000004.00000001.sdmpBinary or memory string: vmware sata5vmware usb pointing device-vmware vmci bus deviceCvmware virtual s scsi disk device
        Source: edjdjdn.exe, 0000000E.00000002.1080195980.0000000002730000.00000004.00000001.sdmpBinary or memory string: vboxservicevbox)Microsoft Virtual PC
        Source: PO#4018-308875.exe, 00000000.00000002.786471639.00000000058B0000.00000002.00000001.sdmp, InstallUtil.exe, 00000013.00000002.1087466820.00000000060C0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: PO#4018-308875.exe, 00000000.00000002.786471639.00000000058B0000.00000002.00000001.sdmp, InstallUtil.exe, 00000013.00000002.1087466820.00000000060C0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: edjdjdn.exe, 0000000E.00000002.1080195980.0000000002730000.00000004.00000001.sdmpBinary or memory string: virtual-vmware pointing device
        Source: PO#4018-308875.exe, 00000000.00000002.781248980.0000000001526000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: PO#4018-308875.exe, 00000000.00000002.786471639.00000000058B0000.00000002.00000001.sdmp, InstallUtil.exe, 00000013.00000002.1087466820.00000000060C0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess token adjusted: Debug
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\PO#4018-308875.exeMemory allocated: page read and write | page guard

        HIPS / PFW / Operating System Protection Evasion:

        barindex
        Allocates memory in foreign processesShow sources
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeMemory allocated: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 420000 protect: page execute and read and write
        Injects a PE file into a foreign processesShow sources
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 420000 value starts with: 4D5A
        Writes to foreign memory regionsShow sources
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 420000
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 422000
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 440000
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 442000
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeMemory written: C:\Users\user\AppData\Local\Temp\InstallUtil.exe base: 234008
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess created: C:\Windows\SysWOW64\cmd.exe 'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'vsg63637' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\edjdjdn.exe'
        Source: C:\Users\user\Desktop\PO#4018-308875.exeProcess created: C:\Users\user\AppData\Roaming\edjdjdn.exe 'C:\Users\user\AppData\Roaming\edjdjdn.exe'
        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'vsg63637' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\edjdjdn.exe'
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeProcess created: C:\Users\user\AppData\Local\Temp\InstallUtil.exe C:\Users\user\AppData\Local\Temp\InstallUtil.exe
        Source: edjdjdn.exe, 0000000E.00000002.1079871362.0000000001170000.00000002.00000001.sdmp, InstallUtil.exe, 00000013.00000002.1079954779.00000000025B7000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: edjdjdn.exe, 0000000E.00000002.1079871362.0000000001170000.00000002.00000001.sdmp, InstallUtil.exe, 00000013.00000002.1079563456.0000000001050000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: edjdjdn.exe, 0000000E.00000002.1079871362.0000000001170000.00000002.00000001.sdmp, InstallUtil.exe, 00000013.00000002.1079563456.0000000001050000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: edjdjdn.exe, 0000000E.00000002.1079871362.0000000001170000.00000002.00000001.sdmp, InstallUtil.exe, 00000013.00000002.1079563456.0000000001050000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: InstallUtil.exe, 00000013.00000002.1079954779.00000000025B7000.00000004.00000001.sdmpBinary or memory string: Program Manager`
        Source: InstallUtil.exe, 00000013.00000002.1079954779.00000000025B7000.00000004.00000001.sdmpBinary or memory string: Program ManagerHaYk
        Source: C:\Users\user\Desktop\PO#4018-308875.exeQueries volume information: C:\Users\user\Desktop\PO#4018-308875.exe VolumeInformation
        Source: C:\Users\user\Desktop\PO#4018-308875.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#4018-308875.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeQueries volume information: C:\Users\user\AppData\Roaming\edjdjdn.exe VolumeInformation
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Roaming\edjdjdn.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Users\user\AppData\Local\Temp\InstallUtil.exe VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\AppData\Local\Temp\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\PO#4018-308875.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000E.00000002.1087650939.000000000424A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.1087171564.00000000040B4000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.782898982.0000000004AC7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.783786131.0000000004C5D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.1082965333.00000000035A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.1078429432.0000000000422000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.1087119513.0000000005040000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.1086961721.0000000004021000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: edjdjdn.exe PID: 2016, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5480, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: PO#4018-308875.exe PID: 4780, type: MEMORY
        Source: Yara matchFile source: 19.2.InstallUtil.exe.5040000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.InstallUtil.exe.5040000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.InstallUtil.exe.420000.1.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: PO#4018-308875.exe, 00000000.00000002.783786131.0000000004C5D000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: edjdjdn.exe, 0000000E.00000002.1087650939.000000000424A000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: InstallUtil.exe, 00000013.00000002.1079954779.00000000025B7000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: InstallUtil.exe, 00000013.00000002.1079954779.00000000025B7000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 0000000E.00000002.1087650939.000000000424A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.1087171564.00000000040B4000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.782898982.0000000004AC7000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.783786131.0000000004C5D000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.1082965333.00000000035A9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.1078429432.0000000000422000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000013.00000002.1087119513.0000000005040000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000E.00000002.1086961721.0000000004021000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: edjdjdn.exe PID: 2016, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 5480, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: PO#4018-308875.exe PID: 4780, type: MEMORY
        Source: Yara matchFile source: 19.2.InstallUtil.exe.5040000.6.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.InstallUtil.exe.5040000.6.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 19.2.InstallUtil.exe.420000.1.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts1Windows Management InstrumentationValid Accounts1Valid Accounts1Masquerading1Input Capture21Query Registry1Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobRegistry Run Keys / Startup Folder1Access Token Manipulation1Valid Accounts1LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Process Injection312Modify Registry1Security Account ManagerVirtualization/Sandbox Evasion3SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationRemote Access Software1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Registry Run Keys / Startup Folder1Access Token Manipulation1NTDSProcess Discovery2Distributed Component Object ModelInput CaptureScheduled TransferNon-Application Layer Protocol1SIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion3LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsApplication Layer Protocol21Manipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonDisable or Modify Tools1Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection312DCSyncSystem Information Discovery12Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobDeobfuscate/Decode Files or Information1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
        Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Hidden Files and Directories1/etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
        Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Obfuscated Files or Information1Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
        Compromise Software Dependencies and Development ToolsWindows Command ShellCronCronSoftware Packing11Input CapturePermission Groups DiscoveryReplication Through Removable MediaRemote Data StagingExfiltration Over Physical MediumMail ProtocolsService Stop

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        No Antivirus matches

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%MetadefenderBrowse
        C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%ReversingLabs

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        19.2.InstallUtil.exe.420000.1.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        19.2.InstallUtil.exe.5040000.6.unpack100%AviraTR/NanoCore.fadteDownload File

        Domains

        SourceDetectionScannerLabelLink
        fenixalec.ddns.net4%VirustotalBrowse

        URLs

        SourceDetectionScannerLabelLink
        http://ns.ado/IdentB0%Avira URL Cloudsafe
        http://crl.micros:0%Avira URL Cloudsafe
        http://iptc.tc4xmp0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        NameIPActiveMaliciousAntivirus DetectionReputation
        fenixalec.ddns.net
        185.162.88.26
        truetrueunknown

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://ns.ado/IdentBPO#4018-308875.exe, 00000000.00000002.781552925.0000000001699000.00000004.00000040.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://crl.micros:PO#4018-308875.exe, 00000000.00000002.781295935.0000000001578000.00000004.00000020.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://iptc.tc4xmpedjdjdn.exe, 0000000E.00000002.1079742606.0000000000BA9000.00000004.00000040.sdmpfalse
        • Avira URL Cloud: safe
        unknown

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        185.162.88.26:2091
        unknownunknown
        unknownunknowntrue
        185.162.88.26
        unknownNetherlands
        40676AS40676UStrue

        General Information

        Joe Sandbox Version:31.0.0 Red Diamond
        Analysis ID:342480
        Start date:21.01.2021
        Start time:07:22:36
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 11m 22s
        Hypervisor based Inspection enabled:false
        Report type:light
        Sample file name:PO#4018-308875.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:21
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@10/5@10/2
        EGA Information:Failed
        HDC Information:
        • Successful, ratio: 1.2% (good quality ratio 0.7%)
        • Quality average: 38.6%
        • Quality standard deviation: 35.1%
        HCA Information:
        • Successful, ratio: 98%
        • Number of executed functions: 0
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        Warnings:
        Show All
        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
        • TCP Packets have been reduced to 100
        • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
        • Excluded IPs from analysis (whitelisted): 104.43.139.144, 52.147.198.201, 51.104.139.180, 92.122.213.247, 92.122.213.194, 205.185.216.10, 205.185.216.42, 52.155.217.156, 20.54.26.129, 51.11.168.160
        • Excluded domains from analysis (whitelisted): displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, arc.msn.com.nsatc.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, skypedataprdcolcus16.cloudapp.net, cds.d2s7q6s2.hwcdn.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus16.cloudapp.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtReadVirtualMemory calls found.

        Simulations

        Behavior and APIs

        TimeTypeDescription
        07:23:44API Interceptor197x Sleep call for process: PO#4018-308875.exe modified
        07:23:46AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run vsg63637 C:\Users\user\AppData\Roaming\edjdjdn.exe
        07:23:54AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run vsg63637 C:\Users\user\AppData\Roaming\edjdjdn.exe
        07:24:31API Interceptor227x Sleep call for process: edjdjdn.exe modified

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        185.162.88.26PO#4018-308875.exeGet hashmaliciousBrowse
          PO#4018-308875.pdf.exeGet hashmaliciousBrowse
            MEDUSI492126.pdf.exeGet hashmaliciousBrowse
              silkOrder00110.pdf.exeGet hashmaliciousBrowse
                Order_BC012356.pdf.exeGet hashmaliciousBrowse
                  Document#20014464370.pdf.exeGet hashmaliciousBrowse

                    Domains

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    fenixalec.ddns.netPO#4018-308875.exeGet hashmaliciousBrowse
                    • 185.162.88.26
                    PO#4018-308875.pdf.exeGet hashmaliciousBrowse
                    • 185.162.88.26
                    MEDUSI492126.pdf.exeGet hashmaliciousBrowse
                    • 185.162.88.26
                    silkOrder00110.pdf.exeGet hashmaliciousBrowse
                    • 185.162.88.26
                    Order_BC012356.pdf.exeGet hashmaliciousBrowse
                    • 185.162.88.26
                    Document#20014464370.pdf.exeGet hashmaliciousBrowse
                    • 185.162.88.26

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    AS40676USPO#4018-308875.exeGet hashmaliciousBrowse
                    • 185.162.88.26
                    PO#4018-308875.pdf.exeGet hashmaliciousBrowse
                    • 185.162.88.26
                    Ulma9B5jo1.exeGet hashmaliciousBrowse
                    • 104.149.57.92
                    MEDUSI492126.pdf.exeGet hashmaliciousBrowse
                    • 185.162.88.26
                    Request for Quotation.exeGet hashmaliciousBrowse
                    • 45.34.249.53
                    silkOrder00110.pdf.exeGet hashmaliciousBrowse
                    • 185.162.88.26
                    Order_BC012356.pdf.exeGet hashmaliciousBrowse
                    • 185.162.88.26
                    Document#20014464370.pdf.exeGet hashmaliciousBrowse
                    • 185.162.88.26
                    t1XJOlYvhExZyrm.exeGet hashmaliciousBrowse
                    • 104.225.208.15
                    SWIFT_COPY00993Payment_advic4555pdf.exeGet hashmaliciousBrowse
                    • 172.106.111.244
                    QN08qH1zYv.exeGet hashmaliciousBrowse
                    • 104.149.57.92
                    SWIFT-COPY Payment advice3243343.exeGet hashmaliciousBrowse
                    • 172.106.111.244
                    catalogo TAWI group.exeGet hashmaliciousBrowse
                    • 107.160.127.252
                    Rfq 214871_TAWI Catalog.exeGet hashmaliciousBrowse
                    • 107.160.127.252
                    Rfq_Catalog.exeGet hashmaliciousBrowse
                    • 107.160.127.252
                    NPD76122.exeGet hashmaliciousBrowse
                    • 104.217.231.247
                    h3dFAROdF3.exeGet hashmaliciousBrowse
                    • 104.217.231.248
                    d2mISAbTQN.exeGet hashmaliciousBrowse
                    • 104.217.231.248
                    n41pVXkYCe.exeGet hashmaliciousBrowse
                    • 104.217.231.248
                    kqwqyoFz1C.exeGet hashmaliciousBrowse
                    • 104.217.231.248

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    C:\Users\user\AppData\Local\Temp\InstallUtil.exePO#4018-308875.exeGet hashmaliciousBrowse
                      IMG_57880.pdf.exeGet hashmaliciousBrowse
                        PO 67542 PDF.exeGet hashmaliciousBrowse
                          Mi9eI6wu1p.exeGet hashmaliciousBrowse
                            OJ4zX7G77Y.exeGet hashmaliciousBrowse
                              IMG_50781.pdf.exeGet hashmaliciousBrowse
                                IMG_25579.pdf.exeGet hashmaliciousBrowse
                                  IMG_40317.pdf.exeGet hashmaliciousBrowse
                                    PO#4018-308875.pdf.exeGet hashmaliciousBrowse
                                      SecuriteInfo.com.Trojan.PackedNET.509.8504.exeGet hashmaliciousBrowse
                                        IMG_80137.pdf.exeGet hashmaliciousBrowse
                                          Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousBrowse
                                            MEDUSI492126.pdf.exeGet hashmaliciousBrowse
                                              2GNCGUZ6JU.exeGet hashmaliciousBrowse
                                                IMG_53771.pdf.exeGet hashmaliciousBrowse
                                                  SecuriteInfo.com.Generic.mg.fb5363e0cae04979.exeGet hashmaliciousBrowse
                                                    Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousBrowse
                                                      silkOrder00110.pdf.exeGet hashmaliciousBrowse
                                                        74725794.exeGet hashmaliciousBrowse
                                                          74725794.exeGet hashmaliciousBrowse

                                                            Created / dropped Files

                                                            C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PO#4018-308875.exe.log
                                                            Process:C:\Users\user\Desktop\PO#4018-308875.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:modified
                                                            Size (bytes):1451
                                                            Entropy (8bit):5.345862727722058
                                                            Encrypted:false
                                                            SSDEEP:24:ML9E4Ks2eE4O1lEE4UVwPKDE4KhK3VZ9pKhuE4IWUAE4KI6no84G1qE4j:MxHKXeHKlEHU0YHKhQnouHIW7HKjovGm
                                                            MD5:06F54CDBFEF62849AF5AE052722BD7B6
                                                            SHA1:FB0250AAC2057D0B5BCE4CE130891E428F28DA05
                                                            SHA-256:4C039B93A728B546F49C47ED8B448D40A3553CDAABB147067AEE3958133CB446
                                                            SHA-512:34EF5F6D5EAB0E5B11AC81F0D72FC56304291EDEEF6D19DF7145FDECAB5D342767DBBC0B4384B8DECB5741E6B85A4B431DF14FBEB5DDF2DEE103064D2895EABB
                                                            Malicious:false
                                                            Reputation:moderate, very likely benign file
                                                            Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                                                            C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                            Process:C:\Users\user\Desktop\PO#4018-308875.exe
                                                            File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):41064
                                                            Entropy (8bit):6.164873449128079
                                                            Encrypted:false
                                                            SSDEEP:384:FtpFVLK0MsihB9VKS7xdgE7KJ9Yl6dnPU3SERztmbqCJstdMardz/JikPZ+sPZTd:ZBMs2SqdD86Iq8gZZFyViML3an
                                                            MD5:EFEC8C379D165E3F33B536739AEE26A3
                                                            SHA1:C875908ACBA5CAC1E0B40F06A83F0F156A2640FA
                                                            SHA-256:46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
                                                            SHA-512:497847EC115D9AF78899E6DC20EC32A60B16954F83CF5169A23DD3F1459CB632DAC95417BD898FD1895C9FE2262FCBF7838FCF6919FB3B851A0557FBE07CCFFA
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Joe Sandbox View:
                                                            • Filename: PO#4018-308875.exe, Detection: malicious, Browse
                                                            • Filename: IMG_57880.pdf.exe, Detection: malicious, Browse
                                                            • Filename: PO 67542 PDF.exe, Detection: malicious, Browse
                                                            • Filename: Mi9eI6wu1p.exe, Detection: malicious, Browse
                                                            • Filename: OJ4zX7G77Y.exe, Detection: malicious, Browse
                                                            • Filename: IMG_50781.pdf.exe, Detection: malicious, Browse
                                                            • Filename: IMG_25579.pdf.exe, Detection: malicious, Browse
                                                            • Filename: IMG_40317.pdf.exe, Detection: malicious, Browse
                                                            • Filename: PO#4018-308875.pdf.exe, Detection: malicious, Browse
                                                            • Filename: SecuriteInfo.com.Trojan.PackedNET.509.8504.exe, Detection: malicious, Browse
                                                            • Filename: IMG_80137.pdf.exe, Detection: malicious, Browse
                                                            • Filename: Ziraat Bankasi Swift Mesaji.exe, Detection: malicious, Browse
                                                            • Filename: MEDUSI492126.pdf.exe, Detection: malicious, Browse
                                                            • Filename: 2GNCGUZ6JU.exe, Detection: malicious, Browse
                                                            • Filename: IMG_53771.pdf.exe, Detection: malicious, Browse
                                                            • Filename: SecuriteInfo.com.Generic.mg.fb5363e0cae04979.exe, Detection: malicious, Browse
                                                            • Filename: Ziraat Bankasi Swift Mesaji.exe, Detection: malicious, Browse
                                                            • Filename: silkOrder00110.pdf.exe, Detection: malicious, Browse
                                                            • Filename: 74725794.exe, Detection: malicious, Browse
                                                            • Filename: 74725794.exe, Detection: malicious, Browse
                                                            Reputation:moderate, very likely benign file
                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z..............0..T...........r... ........@.. ....................................`.................................4r..O....................b..h>...........p............................................... ............... ..H............text....R... ...T.................. ..`.rsrc................V..............@..@.reloc...............`..............@..B................hr......H........"..|J..........lm.......o......................................2~.....o....*.r...p(....*VrK..p(....s.........*..0..........(....(....o....o....(....o.... .....T(....o....(....o....o ...o!....4(....o....(....o....o ...o".....(....rm..ps#...o....($........(%....o&....ry..p......%.r...p.%.(.....(....('....((.......o)...('........*.*................"..(*...*..{Q...-...}Q.....(+...(....(,....(+...*"..(-...*..(....*..(.....r...p.(/...o0...s....}T...*....0.. .......~S...-.s
                                                            C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
                                                            Process:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                            File Type:Non-ISO extended-ASCII text, with no line terminators
                                                            Category:dropped
                                                            Size (bytes):8
                                                            Entropy (8bit):3.0
                                                            Encrypted:false
                                                            SSDEEP:3:J1dt:7v
                                                            MD5:69FC7A084233A9D318566A39B29761DF
                                                            SHA1:9DB017FBFB8901731C39F8C483067A0AF47F8184
                                                            SHA-256:B1E5088ECDFA706C9D85DA82363C2B27FAB16992FF6EFE2094762B9A0297B66D
                                                            SHA-512:8F6F36DB75F7C84A6C8BE57E1F255F3BD6816046FC2DE9DEDFC1B25A593894DCD8024C6FF059389C1C51D45677C6B65E2276B6968C0585CFBC67717652BF5275
                                                            Malicious:true
                                                            Reputation:low
                                                            Preview: /..L..H
                                                            C:\Users\user\AppData\Roaming\edjdjdn.exe
                                                            Process:C:\Users\user\Desktop\PO#4018-308875.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):1103872
                                                            Entropy (8bit):4.423145414224415
                                                            Encrypted:false
                                                            SSDEEP:6144:wbsFaMJcy4y50jRVCdT3/ceLDcLuZTvyH+mff7BBTkNAo23KB2pTwcSn9vCfEvgH:5hH50jwcEc6tyHpTkJ23d9ZSn9VtN
                                                            MD5:37BB301570706E9B086C26C16E7CDB83
                                                            SHA1:9FF8D1DCCA0C34F62113CD7F0A5028923299CD27
                                                            SHA-256:4E599DDA2D5D0F3CAD7AC5451A39CB1C4934EA0F10FD9163E82711455AAF3EFD
                                                            SHA-512:215F8B9165A273D12CC2BBF2F74172FFAD4D2FEF3B56B48DEDAC18B5785B12C44A358B0B701CE2099472D9A8FE20CA35686801731209DB2276DAC5D39AA864C8
                                                            Malicious:true
                                                            Reputation:low
                                                            Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....YF\.....................V.......... ........@.. ....................... ............`.....................................W........R........................................................................... ............... ..H............text........ ...................... ..`.rsrc....R.......T..................@..@.reloc..............................@..B.......................H.......Le..H:......>...@/...6..........................................p.8(..]........_.n.(.$.4.....H..^SjA....0A-.g.I.....h".........{..........LC..;^_.5py.l'..Jf.J.1..j.q.@...o.w..A((.f...<.D'.}.).....9....!.8.......29...a...7.1.d.Q5\..s.?7.E`..N..{.^>. t....XCW..O..N.g{.H.8......=x..,.iZEdo.p..P.NH>_.A........*...).[.Y4$h.V...;p.Z.,."N..O..`.S.a...o.m6u.R(w.}....=......l.G..{Y.g.B.V......[....{..B.K.L.Jlg.8........=:O3Il... .r..q.}n..&./.......UH..
                                                            C:\Users\user\AppData\Roaming\edjdjdn.exe:Zone.Identifier
                                                            Process:C:\Users\user\Desktop\PO#4018-308875.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:dropped
                                                            Size (bytes):26
                                                            Entropy (8bit):3.95006375643621
                                                            Encrypted:false
                                                            SSDEEP:3:ggPYV:rPYV
                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                            Malicious:true
                                                            Reputation:high, very likely benign file
                                                            Preview: [ZoneTransfer]....ZoneId=0

                                                            Static File Info

                                                            General

                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):4.423145414224415
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            • DOS Executable Generic (2002/1) 0.01%
                                                            File name:PO#4018-308875.exe
                                                            File size:1103872
                                                            MD5:37bb301570706e9b086c26c16e7cdb83
                                                            SHA1:9ff8d1dcca0c34f62113cd7f0a5028923299cd27
                                                            SHA256:4e599dda2d5d0f3cad7ac5451a39cb1c4934ea0f10fd9163e82711455aaf3efd
                                                            SHA512:215f8b9165a273d12cc2bbf2f74172ffad4d2fef3b56b48dedac18b5785b12c44a358b0b701ce2099472d9a8fe20ca35686801731209db2276dac5d39aa864c8
                                                            SSDEEP:6144:wbsFaMJcy4y50jRVCdT3/ceLDcLuZTvyH+mff7BBTkNAo23KB2pTwcSn9vCfEvgH:5hH50jwcEc6tyHpTkJ23d9ZSn9VtN
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....YF\.....................V........... ........@.. ....................... ............`................................

                                                            File Icon

                                                            Icon Hash:9071d0cc686c6c00

                                                            Static PE Info

                                                            General

                                                            Entrypoint:0x4a9fee
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                            DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                            Time Stamp:0x5C465993 [Mon Jan 21 23:45:23 2019 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:v4.0.30319
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                            Entrypoint Preview

                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add al, 00h
                                                            add eax, dword ptr [eax]
                                                            add byte ptr [eax], al
                                                            xor byte ptr [eax], al
                                                            add byte ptr [eax+0000000Eh], al
                                                            pushad
                                                            add dword ptr [eax], eax
                                                            adc byte ptr [eax], 00000000h
                                                            add byte ptr [eax], al
                                                            nop
                                                            add dword ptr [eax], eax
                                                            sbb byte ptr [eax], 00000000h
                                                            add byte ptr [eax], al
                                                            rol byte ptr [ecx], 00000000h
                                                            add byte ptr [eax], 00000000h
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            or dword ptr [eax], eax
                                                            xor al, byte ptr [eax]
                                                            add byte ptr [eax], al
                                                            mov byte ptr [eax], al
                                                            add byte ptr [eax+00000033h], al
                                                            mov al, byte ptr [34800000h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax+35800000h], bh
                                                            add byte ptr [eax], al
                                                            add al, dl
                                                            add byte ptr [eax], al
                                                            xor byte ptr [esi], 00000000h
                                                            add byte ptr [eax], al
                                                            call 00007F365C1BDE15h
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add dword ptr [eax], eax
                                                            cmp byte ptr [eax], 00000000h
                                                            add byte ptr [eax], al
                                                            sbb byte ptr [ecx], al
                                                            add byte ptr [eax+00000039h], al
                                                            xor byte ptr [ecx], al
                                                            add byte ptr [eax+0000003Ah], al
                                                            dec eax
                                                            add dword ptr [eax], eax
                                                            add byte ptr [eax], 00000000h
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add dword ptr [eax], eax
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            lock add dword ptr [eax], eax
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [ecx], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al

                                                            Data Directories

                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xa9f940x57.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x652c6.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1100000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                            Sections

                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000xa7ff40xa8000False0.529007684617data5.51964409902IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                            .rsrc0xaa0000x652c60x65400False0.0656105324074data1.74098903041IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x1100000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                            Resources

                                                            NameRVASizeTypeLanguageCountry
                                                            RT_ICON0xaa2b00x468GLS_BINARY_LSB_FIRST
                                                            RT_ICON0xaa7180x810data
                                                            RT_ICON0xaaf280x988data
                                                            RT_ICON0xab8b00x10a8data
                                                            RT_ICON0xac9580x25a8data
                                                            RT_ICON0xaef000x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 65279, next used block 4286513152
                                                            RT_ICON0xb31280x94a8data
                                                            RT_ICON0xbc5d00x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0
                                                            RT_ICON0xccdf80x42028dBase IV DBT, blocks size 0, block length 8192, next free block index 40, next free block 0, next used block 0
                                                            RT_GROUP_ICON0x10ee200x84data
                                                            RT_VERSION0x10eea40x238dataEnglishUnited States
                                                            RT_MANIFEST0x10f0dc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                            Imports

                                                            DLLImport
                                                            mscoree.dll_CorExeMain

                                                            Version Infos

                                                            DescriptionData
                                                            InternalNameICQSetup
                                                            FileVersion10.0.42760
                                                            ProductNameICQSetup
                                                            ProductVersion10.0.42760
                                                            FileDescriptionICQSetup
                                                            OriginalFilenameICQSetup.exe
                                                            Translation0x0009 0x04b0

                                                            Possible Origin

                                                            Language of compilation systemCountry where language is spokenMap
                                                            EnglishUnited States

                                                            Network Behavior

                                                            Network Port Distribution

                                                            TCP Packets

                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 21, 2021 07:25:10.084757090 CET4976320911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:10.135430098 CET2091149763185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:10.636509895 CET4976320911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:10.686858892 CET2091149763185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:11.199024916 CET4976320911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:11.249466896 CET2091149763185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:15.404979944 CET4976420911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:15.455677986 CET2091149764185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:15.965150118 CET4976420911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:16.016422987 CET2091149764185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:16.527636051 CET4976420911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:16.578141928 CET2091149764185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:20.607485056 CET4976520911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:20.658657074 CET2091149765185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:21.168693066 CET4976520911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:21.219743967 CET2091149765185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:21.732074022 CET4976520911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:21.783231974 CET2091149765185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:26.519938946 CET4976620911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:26.570497990 CET2091149766185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:27.075679064 CET4976620911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:27.127592087 CET2091149766185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:27.637871981 CET4976620911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:27.688370943 CET2091149766185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:31.765475035 CET4976720911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:31.816122055 CET2091149767185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:32.325874090 CET4976720911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:32.376573086 CET2091149767185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:32.888333082 CET4976720911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:32.938956976 CET2091149767185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:37.023281097 CET4976820911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:37.073843002 CET2091149768185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:37.576272011 CET4976820911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:37.627008915 CET2091149768185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:38.138797998 CET4976820911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:38.189377069 CET2091149768185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:42.453793049 CET4976920911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:42.504384995 CET2091149769185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:43.014149904 CET4976920911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:43.064822912 CET2091149769185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:43.576734066 CET4976920911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:43.627396107 CET2091149769185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:47.641136885 CET4977020911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:47.692082882 CET2091149770185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:48.202152967 CET4977020911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:48.252870083 CET2091149770185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:48.764609098 CET4977020911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:48.815094948 CET2091149770185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:52.829230070 CET4977120911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:52.879786968 CET2091149771185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:53.390049934 CET4977120911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:53.440536022 CET2091149771185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:53.952632904 CET4977120911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:54.003262043 CET2091149771185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:58.578113079 CET4977220911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:58.628762007 CET2091149772185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:59.140527964 CET4977220911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:59.191127062 CET2091149772185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:25:59.703069925 CET4977220911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:25:59.753623009 CET2091149772185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:03.832163095 CET4977320911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:03.882600069 CET2091149773185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:04.390923023 CET4977320911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:04.441529036 CET2091149773185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:04.953460932 CET4977320911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:05.003958941 CET2091149773185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:09.179330111 CET4977420911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:09.229964018 CET2091149774185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:09.735121012 CET4977420911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:09.785792112 CET2091149774185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:10.297653913 CET4977420911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:10.348231077 CET2091149774185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:14.362057924 CET4977520911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:14.412486076 CET2091149775185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:14.923171997 CET4977520911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:14.974080086 CET2091149775185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:15.485615015 CET4977520911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:15.536632061 CET2091149775185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:19.668240070 CET4977620911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:19.718915939 CET2091149776185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:20.236001015 CET4977620911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:20.286365986 CET2091149776185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:20.800519943 CET4977620911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:20.851195097 CET2091149776185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:25.040997028 CET4977720911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:25.091607094 CET2091149777185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:25.595813990 CET4977720911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:25.646759033 CET2091149777185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:26.158415079 CET4977720911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:26.209120035 CET2091149777185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:32.531191111 CET4977820911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:32.581801891 CET2091149778185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:33.097881079 CET4977820911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:33.148626089 CET2091149778185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:33.659120083 CET4977820911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:33.709517002 CET2091149778185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:37.784584045 CET4977920911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:37.835364103 CET2091149779185.162.88.26192.168.2.4
                                                            Jan 21, 2021 07:26:38.346894026 CET4977920911192.168.2.4185.162.88.26
                                                            Jan 21, 2021 07:26:38.397449970 CET2091149779185.162.88.26192.168.2.4

                                                            UDP Packets

                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 21, 2021 07:23:43.614543915 CET4925753192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:43.665257931 CET53492578.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:23:44.689234018 CET6238953192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:44.739881039 CET53623898.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:23:45.495834112 CET4991053192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:45.551877975 CET53499108.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:23:46.378259897 CET5585453192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:46.426289082 CET53558548.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:23:47.343100071 CET6454953192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:47.399133921 CET53645498.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:23:48.887177944 CET6315353192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:48.935190916 CET53631538.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:23:51.199719906 CET5299153192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:51.255995989 CET53529918.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:23:52.165663958 CET5370053192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:52.221847057 CET53537008.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:23:52.642466068 CET5172653192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:52.690581083 CET53517268.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:23:53.182290077 CET5679453192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:53.240659952 CET53567948.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:23:54.135055065 CET5653453192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:55.134255886 CET5653453192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:56.140866041 CET5653453192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:56.191446066 CET53565348.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:23:57.023505926 CET5662753192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:57.074285030 CET53566278.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:23:57.981590033 CET5662153192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:58.032367945 CET53566218.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:23:58.942996025 CET6311653192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:58.990801096 CET53631168.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:23:59.904337883 CET6407853192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:59.926062107 CET6480153192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:23:59.955013037 CET53640788.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:23:59.983828068 CET53648018.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:24:13.170032978 CET6172153192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:24:13.217726946 CET53617218.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:24:15.464132071 CET5125553192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:24:15.523135900 CET53512558.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:24:16.321850061 CET6152253192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:24:16.372677088 CET53615228.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:24:17.001885891 CET5233753192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:24:17.049832106 CET53523378.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:24:17.496665955 CET5504653192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:24:17.544656038 CET53550468.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:24:17.828429937 CET4961253192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:24:17.892405987 CET53496128.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:24:18.001795053 CET4928553192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:24:18.049751043 CET53492858.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:24:18.627716064 CET5060153192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:24:18.686820984 CET53506018.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:24:19.556876898 CET6087553192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:24:19.616302013 CET53608758.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:24:20.426493883 CET5644853192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:24:20.475693941 CET53564488.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:24:21.379967928 CET5917253192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:24:21.430691004 CET53591728.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:24:22.010098934 CET6242053192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:24:22.059067011 CET53624208.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:24:33.951409101 CET6057953192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:24:34.009349108 CET53605798.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:25:04.093010902 CET5018353192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:25:04.140887976 CET53501838.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:25:06.455203056 CET6153153192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:25:06.522239923 CET53615318.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:25:26.455594063 CET4922853192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:25:26.516936064 CET53492288.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:25:31.706206083 CET5979453192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:25:31.764043093 CET53597948.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:25:36.960380077 CET5591653192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:25:37.016804934 CET53559168.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:25:58.479531050 CET5275253192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:25:58.540647030 CET53527528.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:26:03.769551039 CET6054253192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:26:03.828701973 CET53605428.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:26:09.121685028 CET6068953192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:26:09.177673101 CET53606898.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:26:31.458743095 CET6420653192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:26:32.472063065 CET6420653192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:26:32.529617071 CET53642068.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:26:37.726634979 CET5090453192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:26:37.783082008 CET53509048.8.8.8192.168.2.4
                                                            Jan 21, 2021 07:26:42.976655006 CET5752553192.168.2.48.8.8.8
                                                            Jan 21, 2021 07:26:43.034219980 CET53575258.8.8.8192.168.2.4

                                                            DNS Queries

                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                                            Jan 21, 2021 07:25:26.455594063 CET192.168.2.48.8.8.80xd9e8Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                            Jan 21, 2021 07:25:31.706206083 CET192.168.2.48.8.8.80xc317Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                            Jan 21, 2021 07:25:36.960380077 CET192.168.2.48.8.8.80x2c98Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                            Jan 21, 2021 07:25:58.479531050 CET192.168.2.48.8.8.80x8a06Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                            Jan 21, 2021 07:26:03.769551039 CET192.168.2.48.8.8.80x854fStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                            Jan 21, 2021 07:26:09.121685028 CET192.168.2.48.8.8.80xe025Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                            Jan 21, 2021 07:26:31.458743095 CET192.168.2.48.8.8.80x21b9Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                            Jan 21, 2021 07:26:32.472063065 CET192.168.2.48.8.8.80x21b9Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                            Jan 21, 2021 07:26:37.726634979 CET192.168.2.48.8.8.80x368bStandard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)
                                                            Jan 21, 2021 07:26:42.976655006 CET192.168.2.48.8.8.80x9362Standard query (0)fenixalec.ddns.netA (IP address)IN (0x0001)

                                                            DNS Answers

                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                                            Jan 21, 2021 07:25:26.516936064 CET8.8.8.8192.168.2.40xd9e8No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                            Jan 21, 2021 07:25:31.764043093 CET8.8.8.8192.168.2.40xc317No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                            Jan 21, 2021 07:25:37.016804934 CET8.8.8.8192.168.2.40x2c98No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                            Jan 21, 2021 07:25:58.540647030 CET8.8.8.8192.168.2.40x8a06No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                            Jan 21, 2021 07:26:03.828701973 CET8.8.8.8192.168.2.40x854fNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                            Jan 21, 2021 07:26:09.177673101 CET8.8.8.8192.168.2.40xe025No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                            Jan 21, 2021 07:26:32.529617071 CET8.8.8.8192.168.2.40x21b9No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                            Jan 21, 2021 07:26:37.783082008 CET8.8.8.8192.168.2.40x368bNo error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)
                                                            Jan 21, 2021 07:26:43.034219980 CET8.8.8.8192.168.2.40x9362No error (0)fenixalec.ddns.net185.162.88.26A (IP address)IN (0x0001)

                                                            Code Manipulations

                                                            Statistics

                                                            Behavior

                                                            Click to jump to process

                                                            System Behavior

                                                            General

                                                            Start time:07:23:37
                                                            Start date:21/01/2021
                                                            Path:C:\Users\user\Desktop\PO#4018-308875.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:'C:\Users\user\Desktop\PO#4018-308875.exe'
                                                            Imagebase:0xd10000
                                                            File size:1103872 bytes
                                                            MD5 hash:37BB301570706E9B086C26C16E7CDB83
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.782898982.0000000004AC7000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.782898982.0000000004AC7000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.782898982.0000000004AC7000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.783786131.0000000004C5D000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.783786131.0000000004C5D000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.783786131.0000000004C5D000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            Reputation:low

                                                            General

                                                            Start time:07:23:42
                                                            Start date:21/01/2021
                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:'cmd.exe' /c REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'vsg63637' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\edjdjdn.exe'
                                                            Imagebase:0x11d0000
                                                            File size:232960 bytes
                                                            MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            General

                                                            Start time:07:23:43
                                                            Start date:21/01/2021
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff724c50000
                                                            File size:625664 bytes
                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            General

                                                            Start time:07:23:43
                                                            Start date:21/01/2021
                                                            Path:C:\Windows\SysWOW64\reg.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:REG ADD 'HKCU\Software\Microsoft\Windows\CurrentVersion\Run' /f /v 'vsg63637' /t REG_SZ /d 'C:\Users\user\AppData\Roaming\edjdjdn.exe'
                                                            Imagebase:0x940000
                                                            File size:59392 bytes
                                                            MD5 hash:CEE2A7E57DF2A159A065A34913A055C2
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high

                                                            General

                                                            Start time:07:24:26
                                                            Start date:21/01/2021
                                                            Path:C:\Users\user\AppData\Roaming\edjdjdn.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:'C:\Users\user\AppData\Roaming\edjdjdn.exe'
                                                            Imagebase:0x340000
                                                            File size:1103872 bytes
                                                            MD5 hash:37BB301570706E9B086C26C16E7CDB83
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.1087650939.000000000424A000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.1087650939.000000000424A000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.1087650939.000000000424A000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.1087171564.00000000040B4000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.1087171564.00000000040B4000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.1087171564.00000000040B4000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000E.00000002.1086961721.0000000004021000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000E.00000002.1086961721.0000000004021000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 0000000E.00000002.1086961721.0000000004021000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            Reputation:low

                                                            General

                                                            Start time:07:25:02
                                                            Start date:21/01/2021
                                                            Path:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                            Imagebase:0x50000
                                                            File size:41064 bytes
                                                            MD5 hash:EFEC8C379D165E3F33B536739AEE26A3
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:.Net C# or VB.NET
                                                            Yara matches:
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.1086796443.0000000004E10000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.1086796443.0000000004E10000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.1082965333.00000000035A9000.00000004.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.1082965333.00000000035A9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.1078429432.0000000000422000.00000040.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.1078429432.0000000000422000.00000040.00000001.sdmp, Author: Joe Security
                                                            • Rule: NanoCore, Description: unknown, Source: 00000013.00000002.1078429432.0000000000422000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                            • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000013.00000002.1087119513.0000000005040000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000013.00000002.1087119513.0000000005040000.00000004.00000001.sdmp, Author: Florian Roth
                                                            • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000013.00000002.1087119513.0000000005040000.00000004.00000001.sdmp, Author: Joe Security
                                                            Antivirus matches:
                                                            • Detection: 0%, Metadefender, Browse
                                                            • Detection: 0%, ReversingLabs
                                                            Reputation:moderate

                                                            Disassembly

                                                            Code Analysis

                                                            Reset < >