Loading ...

Play interactive tourEdit tour

Analysis Report SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.25241

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.25241 (renamed file extension from 25241 to exe)
Analysis ID:344309
MD5:81956bb4f67d790e13cfd18f4cdd779b
SHA1:0bf781a6c1434d789f963d5dc76fdeae28cb01b4
SHA256:f2b321a162040b2990fe549349f00c9a60c2827ea0e82486f9c2c785d14d1462
Tags:NanoCore

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM_3
Yara detected Nanocore RAT
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains strange resources
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

Startup

  • System is w10x64
  • dhcpmon.exe (PID: 5940 cmdline: 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe' MD5: 81956BB4F67D790E13CFD18F4CDD779B)
    • schtasks.exe (PID: 5328 cmdline: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpCE4C.tmp' MD5: 15FF7D8324231381BAD48A052F85DF04)
      • conhost.exe (PID: 5444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • dhcpmon.exe (PID: 5920 cmdline: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe MD5: 81956BB4F67D790E13CFD18F4CDD779B)
  • cleanup

Malware Configuration

Threatname: NanoCore

{"C2: ": ["127.0.0.1:4009"], "Version: ": "NanoCore Client, Version=1.2.2.0"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.223308431.00000000029F4000.00000004.00000001.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xf7ad:$x1: NanoCore.ClientPluginHost
    • 0xf7da:$x2: IClientNetworkHost
    00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmpNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
    • 0xf7ad:$x2: NanoCore.ClientPluginHost
    • 0x10888:$s4: PipeCreated
    • 0xf7c7:$s5: IClientLoggingHost
    00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xff8d:$x1: NanoCore.ClientPluginHost
      • 0xffca:$x2: IClientNetworkHost
      • 0x13afd:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
      Click to see the 42 entries

      Unpacked PEs

      SourceRuleDescriptionAuthorStrings
      5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
      • 0xf7ad:$x1: NanoCore.ClientPluginHost
      • 0xf7da:$x2: IClientNetworkHost
      5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
      • 0xf7ad:$x2: NanoCore.ClientPluginHost
      • 0x10888:$s4: PipeCreated
      • 0xf7c7:$s5: IClientLoggingHost
      5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
        5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5db0000.3.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
        • 0xe75:$x1: NanoCore.ClientPluginHost
        • 0xe8f:$x2: IClientNetworkHost
        5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5db0000.3.raw.unpackNanocore_RAT_Feb18_1Detects Nanocore RATFlorian Roth
        • 0xe75:$x2: NanoCore.ClientPluginHost
        • 0x1261:$s3: PipeExists
        • 0x1136:$s4: PipeCreated
        • 0xeb0:$s5: IClientLoggingHost
        Click to see the 11 entries

        Sigma Overview

        System Summary:

        barindex
        Sigma detected: NanoCoreShow sources
        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, ProcessId: 5972, TargetFilename: C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
        Sigma detected: Scheduled temp file as task from temp locationShow sources
        Source: Process startedAuthor: Joe Security: Data: Command: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp7261.tmp', CommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp7261.tmp', CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe' , ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, ParentProcessId: 2140, ProcessCommandLine: 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp7261.tmp', ProcessId: 4144

        Signature Overview

        Click to jump to signature section

        Show All Signature Results

        AV Detection:

        barindex
        Found malware configurationShow sources
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5972.5.memstrMalware Configuration Extractor: NanoCore {"C2: ": ["127.0.0.1:4009"], "Version: ": "NanoCore Client, Version=1.2.2.0"}
        Multi AV Scanner detection for dropped fileShow sources
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeVirustotal: Detection: 35%Perma Link
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeReversingLabs: Detection: 30%
        Source: C:\Users\user\AppData\Roaming\TrXHdHpWh.exeVirustotal: Detection: 35%Perma Link
        Source: C:\Users\user\AppData\Roaming\TrXHdHpWh.exeReversingLabs: Detection: 30%
        Multi AV Scanner detection for submitted fileShow sources
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeVirustotal: Detection: 35%Perma Link
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeReversingLabs: Detection: 30%
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.280435129.00000000032F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5920, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 5972, type: MEMORY
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPE
        Machine Learning detection for dropped fileShow sources
        Source: C:\Users\user\AppData\Roaming\TrXHdHpWh.exeJoe Sandbox ML: detected
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJoe Sandbox ML: detected
        Machine Learning detection for sampleShow sources
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeJoe Sandbox ML: detected
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpackAvira: Label: TR/NanoCore.fadte
        Source: 11.2.dhcpmon.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen7

        Compliance:

        barindex
        Uses 32bit PE filesShow sources
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Networking:

        barindex
        C2 URLs / IPs found in malware configurationShow sources
        Source: Malware configuration extractorIPs: 127.0.0.1:4009
        Source: dhcpmon.exe, 0000000B.00000002.280060421.00000000015E7000.00000004.00000020.sdmpString found in binary or memory: http://go.mic
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.223308431.00000000029F4000.00000004.00000001.sdmp, dhcpmon.exe, 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.222654499.0000000000DCB000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmpBinary or memory string: RegisterRawInputDevices

        E-Banking Fraud:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.280435129.00000000032F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5920, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 5972, type: MEMORY
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPE

        System Summary:

        barindex
        Malicious sample detected (through community Yara rule)Show sources
        Source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.593888952.0000000005DB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 0000000B.00000002.280435129.00000000032F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 5920, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 5920, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 5972, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 5972, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5db0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeCode function: 0_2_0116A4D8
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeCode function: 0_2_0116C614
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeCode function: 0_2_0116EAD0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeCode function: 0_2_0116EAE0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeCode function: 5_2_01B5E480
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeCode function: 5_2_01B5E471
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeCode function: 5_2_01B5BBD4
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_054CC614
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_054CEAD0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 6_2_054CEAE0
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_031BE471
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_031BE480
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeCode function: 11_2_031BBBD4
        Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe F2B321A162040B2990FE549349F00C9A60C2827EA0E82486F9C2C785D14D1462
        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\TrXHdHpWh.exe F2B321A162040B2990FE549349F00C9A60C2827EA0E82486F9C2C785D14D1462
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: TrXHdHpWh.exe.0.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: dhcpmon.exe.5.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.223308431.00000000029F4000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSoapName.dll2 vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.222257881.000000000060E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameEnumInt64TypeInfo.exe. vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.222654499.0000000000DCB000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.227420790.0000000006230000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.228213122.0000000006330000.00000002.00000001.sdmpBinary or memory string: originalfilename vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.228213122.0000000006330000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000004.00000002.220283276.000000000024E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameEnumInt64TypeInfo.exe. vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.594056626.00000000065F0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.594527145.0000000006FB0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.586649807.000000000103E000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameEnumInt64TypeInfo.exe. vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeBinary or memory string: OriginalFilenameEnumInt64TypeInfo.exe. vs SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
        Source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.593888952.0000000005DB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.593888952.0000000005DB0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 0000000B.00000002.280435129.00000000032F1000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 5920, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 5920, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 5972, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 5972, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5db0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5db0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Feb18_1 date = 2018-02-19, hash1 = aa486173e9d594729dbb5626748ce10a75ee966481b68c1b4f6323c827d9658c, author = Florian Roth, description = Detects Nanocore RAT, reference = Internal Research - T2T, license = https://creativecommons.org/licenses/by-nc/4.0/
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'CreateDecryptor'
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqVxXNKnhAcArgJoGGYXiyyQu003du003d.csCryptographic APIs: 'TransformFinalBlock'
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
        Source: classification engineClassification label: mal100.troj.evad.winEXE@14/9@0/2
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile created: C:\Program Files (x86)\DHCP MonitorJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile created: C:\Users\user\AppData\Roaming\TrXHdHpWh.exeJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{b4dbb526-0da4-4453-8602-b00f5f7a8285}
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4900:120:WilError_01
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeMutant created: \Sessions\1\BaseNamedObjects\dbtwNmbxuXxomvAczU
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5444:120:WilError_01
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile created: C:\Users\user\AppData\Local\Temp\tmp7261.tmpJump to behavior
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeVirustotal: Detection: 35%
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeReversingLabs: Detection: 30%
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp7261.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe 'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpCE4C.tmp'
        Source: unknownProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: unknownProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp7261.tmp'
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpCE4C.tmp'
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

        Data Obfuscation:

        barindex
        .NET source code contains potential unpackerShow sources
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqxoz66kOqvxr21iYXZYXWiumy9eZGwFWaiX4C5X8aecUu003d.cs.Net Code: #=qKU0J1fiP8KA33eFK1owekQ== System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqjIje6jGWLd2EOkfZXKqBbgu003du003d.cs.Net Code: #=q_FL69pQf17BUSAFbWYu1SStMAbdu$R1GJ8VY8UL5_EA= System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
        Source: initial sampleStatic PE information: section name: .text entropy: 7.47933743717
        Source: initial sampleStatic PE information: section name: .text entropy: 7.47933743717
        Source: initial sampleStatic PE information: section name: .text entropy: 7.47933743717
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqWrm21vQ8CBMZP_RBTwpusAu003du003d.csHigh entropy of concatenated method names: '#=qCgU$tDqtOAyz2b$RwfSF7UzBcCAr0rFJWxm16x7Lre0=', '#=qeD3MBfedCIuKIQf9V1u2N3YS4VXE_FOHqw_XAjWtZK8=', '#=q$mvEHEBkZud$AdHPWqsMQnw5Xm5sD4vBSSmqrKuXGOk=', '#=qZaN94n8dM6tBEf$qCdY2kbTZb5BOW8Z134$2tNv7EJs=', '#=qtlZnL8mho$rv1eTFz0Mw9UYFC_yCabEZ0xtVePn6wR5aSHE7ti3UfKg2l7D0_xk8', '#=qVS$QmQjvFfsXSqQAKGSl6HGbkse2SG0XCab4upVjtRJkvhTEk$oIS2I9Zja7id1Q', '#=qxJg7RxTW1v5mnt12xXeJiYJv_bcctbtL2BCD5MjDi45Hlz6t8vwDNTv1Rv7tgIct', '#=qp$ZVC1r9spi890l$D7IwEd3faoKeWHvv42mVq8wIIWM=', '#=qCoWHlVuoVRMkOzC7RZubJCslkxaEWn9yZiIydECf69$ktj0IPD5wAwC2H5Cc8C$L', '#=qqs1moO$mYaS72OXOWe0Z6GycslEb6e9Ipoy7ppW0O5abIp05ajv8doqdJZHlN3cK'
        Source: 11.2.dhcpmon.exe.400000.0.unpack, u0023u003dqJT4I5hOweIku0024xYFEeDszbikglXCuquUdu0024v9AXtyq2nsu003d.csHigh entropy of concatenated method names: '#=qBeOBlH6CwHFnQdZWWBgZ_pemudZ6CfCVcfOQtgpeG$Y=', '#=q5v5cLSMFBaxiTtOEjscx86gN2ozXlfytiL6UmXnyWtg=', '#=q_XA5h2lVGHLcY9dK754wKGrOjAm6aBbwPxcUJXgJThJUz83kMbCL53G5uuOLP6Rq', '#=qIFfr$DrKqIieRc688$vylAlBsEnx9Z3$TxvrDsPURfM=', '#=qejgvNXJQvgM2GomZsygLjreyguSPQ29pQHqjR_a0dWk=', '#=qCGokdf0OOxeMJLDkXSfc3NPmwygIQ29RjKQWj$wbNGB9C1pPgma_891QiNyTRXcA', '#=qDqyUVyJLXCtYqhZ0$opqkomqhUBn2WCeEEvGAXlNQ$I=', '#=qdImPAY1o3YhbLtukwCQ91cISaeIEWRKSYrGZ3dTVnkY=', '#=qza7O1AHrroJC7yRIJz4wINR_Sgo4hDpQrj_OYfIrlJE=', '#=q6Ct3QmvVLFC7my$dL1uEiHGmXJ5qCuK4WIhDwfhPTFs='
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile created: C:\Users\user\AppData\Roaming\TrXHdHpWh.exeJump to dropped file
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeJump to dropped file

        Boot Survival:

        barindex
        Uses schtasks.exe or at.exe to add and modify task schedulesShow sources
        Source: unknownProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp7261.tmp'

        Hooking and other Techniques for Hiding and Protection:

        barindex
        Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeFile opened: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe:Zone.Identifier read attributes | delete
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess information set: NOOPENFILEERRORBOX

        Malware Analysis System Evasion:

        barindex
        Yara detected AntiVM_3Show sources
        Source: Yara matchFile source: 00000000.00000002.223308431.00000000029F4000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.265566275.0000000003081000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.223203688.0000000002971000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORY
        Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.223308431.00000000029F4000.00000004.00000001.sdmp, dhcpmon.exe, 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.223308431.00000000029F4000.00000004.00000001.sdmp, dhcpmon.exe, 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeThread delayed: delay time: 922337203685477
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeWindow / User API: threadDelayed 3669
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeWindow / User API: threadDelayed 5832
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeWindow / User API: foregroundWindowGot 474
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeWindow / User API: foregroundWindowGot 1353
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe TID: 464Thread sleep time: -49643s >= -30000s
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe TID: 5440Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe TID: 3840Thread sleep time: -11990383647911201s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 2412Thread sleep time: -52994s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 4912Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe TID: 5904Thread sleep time: -922337203685477s >= -30000s
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: dhcpmon.exe, 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.594527145.0000000006FB0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
        Source: dhcpmon.exe, 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmpBinary or memory string: vmware
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.594527145.0000000006FB0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.594527145.0000000006FB0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
        Source: dhcpmon.exe, 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.222723335.0000000000DFF000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.222723335.0000000000DFF000.00000004.00000020.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
        Source: dhcpmon.exe, 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.594527145.0000000006FB0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess information queried: ProcessInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess token adjusted: Debug
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess token adjusted: Debug
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeMemory allocated: page read and write | page guard
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp7261.tmp'
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpCE4C.tmp'
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeProcess created: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.594354708.0000000006A6D000.00000004.00000001.sdmpBinary or memory string: Program Manager
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.588703478.0000000001F10000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.592390913.0000000003859000.00000004.00000001.sdmpBinary or memory string: Program Manager88
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.588703478.0000000001F10000.00000002.00000001.sdmpBinary or memory string: Progman
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.588703478.0000000001F10000.00000002.00000001.sdmpBinary or memory string: Progmanlock
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.589193315.000000000341E000.00000004.00000001.sdmpBinary or memory string: Program ManagerHa#lh
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.588827159.0000000003377000.00000004.00000001.sdmpBinary or memory string: Program ManagerD$#l
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
        Source: C:\Program Files (x86)\DHCP Monitor\dhcpmon.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

        Stealing of Sensitive Information:

        barindex
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.280435129.00000000032F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5920, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 5972, type: MEMORY
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPE

        Remote Access Functionality:

        barindex
        Detected Nanocore RatShow sources
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Source: dhcpmon.exe, 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
        Source: dhcpmon.exe, 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
        Yara detected Nanocore RATShow sources
        Source: Yara matchFile source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 0000000B.00000002.280435129.00000000032F1000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5920, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 2140, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: dhcpmon.exe PID: 5940, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe PID: 5972, type: MEMORY
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 11.2.dhcpmon.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack, type: UNPACKEDPE

        Mitre Att&ck Matrix

        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid AccountsScheduled Task/Job1Scheduled Task/Job1Process Injection12Masquerading2Input Capture21Security Software Discovery211Remote ServicesInput Capture21Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsScheduled Task/Job1Virtualization/Sandbox Evasion3LSASS MemoryVirtualization/Sandbox Evasion3Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothRemote Access Software1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Disable or Modify Tools1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSApplication Window Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsFile and Directory Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
        Replication Through Removable MediaLaunchdRc.commonRc.commonHidden Files and Directories1Cached Domain CredentialsSystem Information Discovery12VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
        External Remote ServicesScheduled TaskStartup ItemsStartup ItemsObfuscated Files or Information1DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
        Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobSoftware Packing12Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

        Behavior Graph

        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 344309 Sample: SecuriteInfo.com.Trojan.Gen... Startdate: 26/01/2021 Architecture: WINDOWS Score: 100 44 127.0.0.1:4009 unknown unknown 2->44 48 Found malware configuration 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 Multi AV Scanner detection for dropped file 2->52 54 12 other signatures 2->54 8 SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe 7 2->8         started        11 dhcpmon.exe 5 2->11         started        signatures3 process4 file5 30 C:\Users\user\AppData\Roaming\TrXHdHpWh.exe, PE32 8->30 dropped 32 C:\Users\...\TrXHdHpWh.exe:Zone.Identifier, ASCII 8->32 dropped 34 C:\Users\user\AppData\Local\...\tmp7261.tmp, XML 8->34 dropped 36 SecuriteInfo.com.T...72687.31999.exe.log, ASCII 8->36 dropped 13 SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe 1 9 8->13         started        18 schtasks.exe 1 8->18         started        20 SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe 8->20         started        22 schtasks.exe 1 11->22         started        24 dhcpmon.exe 2 11->24         started        process6 dnsIp7 46 127.0.0.1 unknown unknown 13->46 38 C:\Program Files (x86)\...\dhcpmon.exe, PE32 13->38 dropped 40 C:\Users\user\AppData\Roaming\...\run.dat, ISO-8859 13->40 dropped 42 C:\...\dhcpmon.exe:Zone.Identifier, ASCII 13->42 dropped 56 Hides that the sample has been downloaded from the Internet (zone.identifier) 13->56 26 conhost.exe 18->26         started        28 conhost.exe 22->28         started        file8 signatures9 process10

        Screenshots

        Thumbnails

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.

        windows-stand

        Antivirus, Machine Learning and Genetic Malware Detection

        Initial Sample

        SourceDetectionScannerLabelLink
        SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe35%VirustotalBrowse
        SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe30%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe100%Joe Sandbox ML

        Dropped Files

        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\TrXHdHpWh.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe100%Joe Sandbox ML
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe35%VirustotalBrowse
        C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe30%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
        C:\Users\user\AppData\Roaming\TrXHdHpWh.exe35%VirustotalBrowse
        C:\Users\user\AppData\Roaming\TrXHdHpWh.exe30%ReversingLabsByteCode-MSIL.Trojan.AgentTesla

        Unpacked PE Files

        SourceDetectionScannerLabelLinkDownload
        5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.5dd0000.4.unpack100%AviraTR/NanoCore.fadteDownload File
        11.2.dhcpmon.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File
        5.2.SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.400000.0.unpack100%AviraTR/Dropper.MSIL.Gen7Download File

        Domains

        No Antivirus matches

        URLs

        SourceDetectionScannerLabelLink
        http://go.mic0%Avira URL Cloudsafe

        Domains and IPs

        Contacted Domains

        No contacted domains info

        URLs from Memory and Binaries

        NameSourceMaliciousAntivirus DetectionReputation
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe, 00000000.00000002.223308431.00000000029F4000.00000004.00000001.sdmp, dhcpmon.exe, 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmpfalse
          high
          http://go.micdhcpmon.exe, 0000000B.00000002.280060421.00000000015E7000.00000004.00000020.sdmpfalse
          • Avira URL Cloud: safe
          unknown

          Contacted IPs

          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs

          Public

          IPDomainCountryFlagASNASN NameMalicious

          Private

          IP
          127.0.0.1
          127.0.0.1:4009

          General Information

          Joe Sandbox Version:31.0.0 Emerald
          Analysis ID:344309
          Start date:26.01.2021
          Start time:12:23:54
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 12m 38s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.25241 (renamed file extension from 25241 to exe)
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:34
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@14/9@0/2
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 0.1% (good quality ratio 0.1%)
          • Quality average: 59.9%
          • Quality standard deviation: 18.1%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          Warnings:
          Show All
          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.

          Simulations

          Behavior and APIs

          TimeTypeDescription
          12:24:48API Interceptor1481x Sleep call for process: SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe modified
          12:24:58AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run DHCP Monitor C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
          12:25:08API Interceptor1x Sleep call for process: dhcpmon.exe modified

          Joe Sandbox View / Context

          IPs

          No context

          Domains

          No context

          ASN

          No context

          JA3 Fingerprints

          No context

          Dropped Files

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          C:\Program Files (x86)\DHCP Monitor\dhcpmon.exePO-FRE590164.xlsxGet hashmaliciousBrowse
            C:\Users\user\AppData\Roaming\TrXHdHpWh.exePO-FRE590164.xlsxGet hashmaliciousBrowse

              Created / dropped Files

              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):781824
              Entropy (8bit):6.923780842614681
              Encrypted:false
              SSDEEP:6144:pQj+CfD1Wb4XogN1uFxjWa2dAdo6IW8bqDchIyDINbtxMOlBRE0ffLjVqE6kXI2i:uC4V1tdA8bqwhBAtNdE0XvVH6kS
              MD5:81956BB4F67D790E13CFD18F4CDD779B
              SHA1:0BF781A6C1434D789F963D5DC76FDEAE28CB01B4
              SHA-256:F2B321A162040B2990FE549349F00C9A60C2827EA0E82486F9C2C785D14D1462
              SHA-512:A6EFB7CD565B2DA0811A79C8EEAB2D4DC470296A7ECCB4BADB21DDAF1ADD94EF3F2F02E2223212A19564137B08919434D65E8BE99F1779E9DD475EB11443E9D7
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Virustotal, Detection: 35%, Browse
              • Antivirus: ReversingLabs, Detection: 30%
              Joe Sandbox View:
              • Filename: PO-FRE590164.xlsx, Detection: malicious, Browse
              Reputation:low
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P..T...........r... ........... .......................@............@.................................lr..O.......P.................... ....................................................... ............... ..H............text....R... ...T.................. ..`.rsrc...P............V..............@..@.reloc....... ......................@..B.................r......H...........d...........D...(.............................................(....*&..(.....*.s.........s.........s ........s!........s"........*...0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*&..((....*...0..<........~.....().....,!r...p.....(*...o+...s,............~.....+..*.0...........~.....+..*".......*.0..&........(....rE..p~....o-...(......t$....+..*...0..<........~.....().....,!
              C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe:Zone.Identifier
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview: [ZoneTransfer]....ZoneId=0
              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe.log
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):1216
              Entropy (8bit):5.355304211458859
              Encrypted:false
              SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
              MD5:69206D3AF7D6EFD08F4B4726998856D3
              SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
              SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
              SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
              Malicious:true
              Reputation:moderate, very likely benign file
              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
              C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dhcpmon.exe.log
              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1216
              Entropy (8bit):5.355304211458859
              Encrypted:false
              SSDEEP:24:MLUE4K5E4Ks2E1qE4x84qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4j:MIHK5HKXE1qHxviYHKhQnoPtHoxHhAHY
              MD5:69206D3AF7D6EFD08F4B4726998856D3
              SHA1:E778D4BF781F7712163CF5E2F5E7C15953E484CF
              SHA-256:A937AD22F9C3E667A062BA0E116672960CD93522F6997C77C00370755929BA87
              SHA-512:CD270C3DF75E548C9B0727F13F44F45262BD474336E89AAEBE56FABFE8076CD4638F88D3C0837B67C2EB3C54055679B07E4212FB3FEDBF88C015EB5DBBCD7FF8
              Malicious:false
              Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
              C:\Users\user\AppData\Local\Temp\tmp7261.tmp
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1642
              Entropy (8bit):5.190572181064251
              Encrypted:false
              SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBAtn:cbh47TlNQ//rydbz9I3YODOLNdq3k
              MD5:9B8DAE50683D5E82527A85241D18D23A
              SHA1:396D9BA714A271A35F2BDBD0191909C1B7B0B6AA
              SHA-256:485BA4B410561795E6DF09517400958D3930DFC35925C48C2F702DD11F57E812
              SHA-512:D33792805AFB31E5997FC12B5271D887EA2FB88475CB5AACC618819AD6E281E292E410875B06AE8F51199E611BE7F630FA0737A0344AC92FA4714E8CF5C0C98C
              Malicious:true
              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
              C:\Users\user\AppData\Local\Temp\tmpCE4C.tmp
              Process:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1642
              Entropy (8bit):5.190572181064251
              Encrypted:false
              SSDEEP:24:2dH4+SEqC/Q7hxlNMFp1/rlMhEMjnGpwjpIgUYODOLD9RJh7h8gKBAtn:cbh47TlNQ//rydbz9I3YODOLNdq3k
              MD5:9B8DAE50683D5E82527A85241D18D23A
              SHA1:396D9BA714A271A35F2BDBD0191909C1B7B0B6AA
              SHA-256:485BA4B410561795E6DF09517400958D3930DFC35925C48C2F702DD11F57E812
              SHA-512:D33792805AFB31E5997FC12B5271D887EA2FB88475CB5AACC618819AD6E281E292E410875B06AE8F51199E611BE7F630FA0737A0344AC92FA4714E8CF5C0C98C
              Malicious:false
              Preview: <?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <RegistrationInfo>.. <Date>2014-10-25T14:27:44.8929027</Date>.. <Author>computer\user</Author>.. </RegistrationInfo>.. <Triggers>.. <LogonTrigger>.. <Enabled>true</Enabled>.. <UserId>computer\user</UserId>.. </LogonTrigger>.. <RegistrationTrigger>.. <Enabled>false</Enabled>.. </RegistrationTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <UserId>computer\user</UserId>.. <LogonType>InteractiveToken</LogonType>.. <RunLevel>LeastPrivilege</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>.. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>.. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>.. <AllowHardTerminate>false</AllowHardTerminate>.. <StartWhenAvailable>true
              C:\Users\user\AppData\Roaming\D06ED635-68F6-4E9A-955C-4899F5F57B9A\run.dat
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              File Type:ISO-8859 text, with no line terminators
              Category:dropped
              Size (bytes):8
              Entropy (8bit):2.75
              Encrypted:false
              SSDEEP:3:ud:ud
              MD5:28118F807F7A01BACBE5AB8F768230F2
              SHA1:923C85C167925A747D112AB236E7E0D35CD26AAF
              SHA-256:1436045EFE2197D379E927706C81950B8265DEA31BB5F03F0A49BB6CA6859342
              SHA-512:A3C676D01F0CE7FF931FE25F1C75E4DC6C7D1A43BDB5706288955FF2B2B43EF9B5ACC68B551794CA5C1E4D52D838E5B6D3B74B7FDEC58D50B40A8A4FE1FC683E
              Malicious:true
              Preview: k.8p8..H
              C:\Users\user\AppData\Roaming\TrXHdHpWh.exe
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):781824
              Entropy (8bit):6.923780842614681
              Encrypted:false
              SSDEEP:6144:pQj+CfD1Wb4XogN1uFxjWa2dAdo6IW8bqDchIyDINbtxMOlBRE0ffLjVqE6kXI2i:uC4V1tdA8bqwhBAtNdE0XvVH6kS
              MD5:81956BB4F67D790E13CFD18F4CDD779B
              SHA1:0BF781A6C1434D789F963D5DC76FDEAE28CB01B4
              SHA-256:F2B321A162040B2990FE549349F00C9A60C2827EA0E82486F9C2C785D14D1462
              SHA-512:A6EFB7CD565B2DA0811A79C8EEAB2D4DC470296A7ECCB4BADB21DDAF1ADD94EF3F2F02E2223212A19564137B08919434D65E8BE99F1779E9DD475EB11443E9D7
              Malicious:true
              Antivirus:
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Virustotal, Detection: 35%, Browse
              • Antivirus: ReversingLabs, Detection: 30%
              Joe Sandbox View:
              • Filename: PO-FRE590164.xlsx, Detection: malicious, Browse
              Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P..T...........r... ........... .......................@............@.................................lr..O.......P.................... ....................................................... ............... ..H............text....R... ...T.................. ..`.rsrc...P............V..............@..@.reloc....... ......................@..B.................r......H...........d...........D...(.............................................(....*&..(.....*.s.........s.........s ........s!........s"........*...0...........~....o#....+..*.0...........~....o$....+..*.0...........~....o%....+..*.0...........~....o&....+..*.0...........~....o'....+..*&..((....*...0..<........~.....().....,!r...p.....(*...o+...s,............~.....+..*.0...........~.....+..*".......*.0..&........(....rE..p~....o-...(......t$....+..*...0..<........~.....().....,!
              C:\Users\user\AppData\Roaming\TrXHdHpWh.exe:Zone.Identifier
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Preview: [ZoneTransfer]....ZoneId=0

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):6.923780842614681
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              • Win32 Executable (generic) a (10002005/4) 49.78%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Generic Win/DOS Executable (2004/3) 0.01%
              • DOS Executable Generic (2002/1) 0.01%
              File name:SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              File size:781824
              MD5:81956bb4f67d790e13cfd18f4cdd779b
              SHA1:0bf781a6c1434d789f963d5dc76fdeae28cb01b4
              SHA256:f2b321a162040b2990fe549349f00c9a60c2827ea0e82486f9c2c785d14d1462
              SHA512:a6efb7cd565b2da0811a79c8eeab2d4dc470296a7eccb4badb21ddaf1add94ef3f2f02e2223212a19564137b08919434d65e8be99f1779e9dd475eb11443e9d7
              SSDEEP:6144:pQj+CfD1Wb4XogN1uFxjWa2dAdo6IW8bqDchIyDINbtxMOlBRE0ffLjVqE6kXI2i:uC4V1tdA8bqwhBAtNdE0XvVH6kS
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......`..............P..T...........r... ........... .......................@............@................................

              File Icon

              Icon Hash:0000000000000000

              Static PE Info

              General

              Entrypoint:0x110a72be
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x11000000
              Subsystem:windows gui
              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
              DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x600EA984 [Mon Jan 25 11:20:36 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:v4.0.30319
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

              Entrypoint Preview

              Instruction
              jmp dword ptr [11002000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xa726c0x4f.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xa80000x19550.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0xc20000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000xa52c40xa5400False0.682253746691data7.47933743717IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .rsrc0xa80000x195500x19600False0.0550819735222data1.06100151007IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0xc20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

              Resources

              NameRVASizeTypeLanguageCountry
              RT_ICON0xa81a00x468GLS_BINARY_LSB_FIRST
              RT_ICON0xa86180x860PNG image data, 256 x 256, 8-bit gray+alpha, non-interlaced
              RT_ICON0xa8e880x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 0, next used block 0
              RT_ICON0xab4400x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 0, next used block 0
              RT_ICON0xac4f80x10828dBase III DBT, version number 0, next free block index 40
              RT_ICON0xbcd300x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 0, next used block 0
              RT_GROUP_ICON0xc0f680x5adata
              RT_VERSION0xc0fd40x37cdata
              RT_MANIFEST0xc13600x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

              Imports

              DLLImport
              mscoree.dll_CorExeMain

              Version Infos

              DescriptionData
              Translation0x0000 0x04b0
              LegalCopyrightBharat Biotech (C) 2021
              Assembly Version48.0.31.9
              InternalNameEnumInt64TypeInfo.exe
              FileVersion48.0.31.09
              CompanyNameBharat Biotech
              LegalTrademarks
              CommentsBBV152
              ProductNameBBV152
              ProductVersion48.0.31.09
              FileDescriptionBBV152
              OriginalFilenameEnumInt64TypeInfo.exe

              Network Behavior

              No network behavior found

              Code Manipulations

              Statistics

              Behavior

              Click to jump to process

              System Behavior

              General

              Start time:12:24:46
              Start date:26/01/2021
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe'
              Imagebase:0x550000
              File size:781824 bytes
              MD5 hash:81956BB4F67D790E13CFD18F4CDD779B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.223308431.00000000029F4000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.224082730.0000000003C5A000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.223203688.0000000002971000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.223591630.0000000003979000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low

              General

              Start time:12:24:49
              Start date:26/01/2021
              Path:C:\Windows\SysWOW64\schtasks.exe
              Wow64 process (32bit):true
              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmp7261.tmp'
              Imagebase:0x1290000
              File size:185856 bytes
              MD5 hash:15FF7D8324231381BAD48A052F85DF04
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:12:24:49
              Start date:26/01/2021
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6b2800000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:12:24:50
              Start date:26/01/2021
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              Wow64 process (32bit):false
              Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              Imagebase:0x190000
              File size:781824 bytes
              MD5 hash:81956BB4F67D790E13CFD18F4CDD779B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low

              General

              Start time:12:24:50
              Start date:26/01/2021
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKDZ.72687.31999.exe
              Imagebase:0xf80000
              File size:781824 bytes
              MD5 hash:81956BB4F67D790E13CFD18F4CDD779B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.593932054.0000000005DD0000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.592605604.0000000004369000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.593888952.0000000005DB0000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: Nanocore_RAT_Feb18_1, Description: Detects Nanocore RAT, Source: 00000005.00000002.593888952.0000000005DB0000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000005.00000002.585642797.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low

              General

              Start time:12:25:06
              Start date:26/01/2021
              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              Wow64 process (32bit):true
              Commandline:'C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe'
              Imagebase:0xc70000
              File size:781824 bytes
              MD5 hash:81956BB4F67D790E13CFD18F4CDD779B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000006.00000002.265717301.0000000003104000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000006.00000002.265566275.0000000003081000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.266031513.0000000004089000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.266422489.000000000436B000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Antivirus matches:
              • Detection: 100%, Joe Sandbox ML
              • Detection: 35%, Virustotal, Browse
              • Detection: 30%, ReversingLabs
              Reputation:low

              General

              Start time:12:25:09
              Start date:26/01/2021
              Path:C:\Windows\SysWOW64\schtasks.exe
              Wow64 process (32bit):true
              Commandline:'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\TrXHdHpWh' /XML 'C:\Users\user\AppData\Local\Temp\tmpCE4C.tmp'
              Imagebase:0x1090000
              File size:185856 bytes
              MD5 hash:15FF7D8324231381BAD48A052F85DF04
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:12:25:10
              Start date:26/01/2021
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff6b2800000
              File size:625664 bytes
              MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high

              General

              Start time:12:25:10
              Start date:26/01/2021
              Path:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              Wow64 process (32bit):true
              Commandline:C:\Program Files (x86)\DHCP Monitor\dhcpmon.exe
              Imagebase:0xdf0000
              File size:781824 bytes
              MD5 hash:81956BB4F67D790E13CFD18F4CDD779B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:.Net C# or VB.NET
              Yara matches:
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, Author: Florian Roth
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.279683575.0000000000402000.00000040.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.280508586.00000000042F9000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 0000000B.00000002.280435129.00000000032F1000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: NanoCore, Description: unknown, Source: 0000000B.00000002.280435129.00000000032F1000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low

              Disassembly

              Code Analysis

              Reset < >