Loading ...

Play interactive tourEdit tour

Analysis Report Dintec Order PDF.exe

Overview

General Information

Sample Name:Dintec Order PDF.exe
Analysis ID:345061
MD5:98e3c2ac1efdd997b05a1fee872630ec
SHA1:d3ce076af7b45e1f11aac5e3a1c984951c7b92ba
SHA256:d09ed1437134f7e5c71ee4877e6d030c2750b6e1873fe6afb0f82b988c591b44
Tags:exeNanoCore

Most interesting Screenshot:

Detection

Nanocore
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Nanocore Rat
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AntiVM_3
Yara detected Nanocore RAT
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Contains capabilities to detect virtual machines
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

Startup

  • System is w10x64
  • Dintec Order PDF.exe (PID: 3480 cmdline: 'C:\Users\user\Desktop\Dintec Order PDF.exe' MD5: 98E3C2AC1EFDD997B05A1FEE872630EC)
    • a.exe (PID: 984 cmdline: 'C:\Users\user\AppData\Roaming\a.exe' MD5: 98E3C2AC1EFDD997B05A1FEE872630EC)
  • a.exe (PID: 6648 cmdline: 'C:\Users\user\AppData\Roaming\a.exe' MD5: 98E3C2AC1EFDD997B05A1FEE872630EC)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000002.681613074.0000000004031000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
  • 0x109b7:$x1: NanoCore.ClientPluginHost
  • 0x4359d:$x1: NanoCore.ClientPluginHost
  • 0x109f4:$x2: IClientNetworkHost
  • 0x435da:$x2: IClientNetworkHost
  • 0x14527:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
  • 0x4710d:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
00000001.00000002.681613074.0000000004031000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
    00000001.00000002.681613074.0000000004031000.00000004.00000001.sdmpNanoCoreunknown Kevin Breen <kevin@techanarchy.net>
    • 0x1071f:$a: NanoCore
    • 0x1072f:$a: NanoCore
    • 0x10963:$a: NanoCore
    • 0x10977:$a: NanoCore
    • 0x109b7:$a: NanoCore
    • 0x43305:$a: NanoCore
    • 0x43315:$a: NanoCore
    • 0x43549:$a: NanoCore
    • 0x4355d:$a: NanoCore
    • 0x4359d:$a: NanoCore
    • 0x1077e:$b: ClientPlugin
    • 0x10980:$b: ClientPlugin
    • 0x109c0:$b: ClientPlugin
    • 0x43364:$b: ClientPlugin
    • 0x43566:$b: ClientPlugin
    • 0x435a6:$b: ClientPlugin
    • 0x108a5:$c: ProjectData
    • 0x4348b:$c: ProjectData
    • 0x112ac:$d: DESCrypto
    • 0x43e92:$d: DESCrypto
    • 0x18c78:$e: KeepAlive
    00000001.00000002.681348992.0000000003E9B000.00000004.00000001.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0xdba07:$x1: NanoCore.ClientPluginHost
    • 0x10e607:$x1: NanoCore.ClientPluginHost
    • 0x1411f7:$x1: NanoCore.ClientPluginHost
    • 0xdba44:$x2: IClientNetworkHost
    • 0x10e644:$x2: IClientNetworkHost
    • 0x141234:$x2: IClientNetworkHost
    • 0xdf577:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x112177:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    • 0x144d67:$x3: #=qjgz7ljmpp0J7FvL9dmi8ctJILdgtcbw8JYUc6GC8MeJ9B11Crfg2Djxcf0p8PZGe
    00000001.00000002.681348992.0000000003E9B000.00000004.00000001.sdmpJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
      Click to see the 5 entries

      Sigma Overview

      No Sigma rule has matched

      Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Multi AV Scanner detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\a.exeVirustotal: Detection: 42%Perma Link
      Multi AV Scanner detection for submitted fileShow sources
      Source: Dintec Order PDF.exeVirustotal: Detection: 42%Perma Link
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000001.00000002.681613074.0000000004031000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.681348992.0000000003E9B000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Dintec Order PDF.exe PID: 3480, type: MEMORY
      Machine Learning detection for dropped fileShow sources
      Source: C:\Users\user\AppData\Roaming\a.exeJoe Sandbox ML: detected
      Machine Learning detection for sampleShow sources
      Source: Dintec Order PDF.exeJoe Sandbox ML: detected

      Compliance:

      barindex
      Uses 32bit PE filesShow sources
      Source: Dintec Order PDF.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
      Source: Dintec Order PDF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
      Binary contains paths to debug symbolsShow sources
      Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: InstallUtil.exe.1.dr
      Source: Binary string: InstallUtil.pdb source: InstallUtil.exe.1.dr
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then push dword ptr [ebp-24h]
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then jmp 04CC0806h
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then xor edx, edx
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then mov esp, ebp
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then push dword ptr [ebp-24h]
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then jmp 04CC0806h
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then push dword ptr [ebp-20h]
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then push dword ptr [ebp-20h]
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 7FFFFFFFh
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then xor edx, edx
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 4x nop then mov esp, ebp
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]
      Source: Dintec Order PDF.exe, 00000001.00000002.680271086.0000000000951000.00000004.00000020.sdmp, a.exe, 00000002.00000002.685914222.0000000000A0E000.00000004.00000020.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
      Source: Dintec Order PDF.exe, 00000001.00000002.680577443.00000000025AA000.00000004.00000001.sdmp, a.exe, 00000002.00000002.685914222.0000000000A0E000.00000004.00000020.sdmp, a.exe, 00000003.00000002.687185207.00000000025DA000.00000004.00000001.sdmpString found in binary or memory: http://crl.pki.goog/GTS1O1core.crl0
      Source: Dintec Order PDF.exe, 00000001.00000002.680271086.0000000000951000.00000004.00000020.sdmp, a.exe, 00000002.00000002.685914222.0000000000A0E000.00000004.00000020.sdmpString found in binary or memory: http://crl.pki.goog/gsr2/gsr2.crl0?
      Source: Dintec Order PDF.exe, 00000001.00000003.647767848.0000000008201000.00000004.00000001.sdmpString found in binary or memory: http://ns.adb
      Source: Dintec Order PDF.exe, 00000001.00000002.685200737.0000000008212000.00000004.00000001.sdmp, Dintec Order PDF.exe, 00000001.00000003.647767848.0000000008201000.00000004.00000001.sdmpString found in binary or memory: http://ns.ado/1
      Source: Dintec Order PDF.exe, 00000001.00000002.685200737.0000000008212000.00000004.00000001.sdmp, Dintec Order PDF.exe, 00000001.00000003.647767848.0000000008201000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.c/g
      Source: Dintec Order PDF.exe, 00000001.00000002.685200737.0000000008212000.00000004.00000001.sdmp, Dintec Order PDF.exe, 00000001.00000003.647767848.0000000008201000.00000004.00000001.sdmpString found in binary or memory: http://ns.adobe.cobj
      Source: Dintec Order PDF.exe, 00000001.00000002.680271086.0000000000951000.00000004.00000020.sdmp, a.exe, 00000002.00000002.685914222.0000000000A0E000.00000004.00000020.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr202
      Source: Dintec Order PDF.exe, 00000001.00000002.680577443.00000000025AA000.00000004.00000001.sdmp, a.exe, 00000002.00000002.685914222.0000000000A0E000.00000004.00000020.sdmp, a.exe, 00000003.00000002.687185207.00000000025DA000.00000004.00000001.sdmpString found in binary or memory: http://ocsp.pki.goog/gts1o1core0
      Source: Dintec Order PDF.exe, 00000001.00000002.680577443.00000000025AA000.00000004.00000001.sdmp, a.exe, 00000002.00000002.685914222.0000000000A0E000.00000004.00000020.sdmp, a.exe, 00000003.00000002.687185207.00000000025DA000.00000004.00000001.sdmpString found in binary or memory: http://pki.goog/gsr2/GTS1O1.crt0
      Source: a.exe, 00000002.00000002.686386684.000000000261A000.00000004.00000001.sdmp, a.exe, 00000003.00000002.687185207.00000000025DA000.00000004.00000001.sdmpString found in binary or memory: http://schema.org/WebPage
      Source: Dintec Order PDF.exe, 00000001.00000002.680463344.0000000002541000.00000004.00000001.sdmp, a.exe, 00000002.00000002.686284355.00000000025BB000.00000004.00000001.sdmp, a.exe, 00000003.00000002.686878655.000000000257B000.00000004.00000001.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: Dintec Order PDF.exe, 00000001.00000002.680271086.0000000000951000.00000004.00000020.sdmp, a.exe, 00000002.00000002.685914222.0000000000A0E000.00000004.00000020.sdmpString found in binary or memory: https://pki.goog/repository/0
      Source: Dintec Order PDF.exe, 00000001.00000002.680463344.0000000002541000.00000004.00000001.sdmp, a.exe, 00000002.00000002.686284355.00000000025BB000.00000004.00000001.sdmp, a.exe, 00000003.00000002.686878655.000000000257B000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com
      Source: Dintec Order PDF.exe, 00000001.00000002.680463344.0000000002541000.00000004.00000001.sdmp, a.exe, 00000002.00000002.686284355.00000000025BB000.00000004.00000001.sdmp, a.exe, 00000003.00000002.686878655.000000000257B000.00000004.00000001.sdmpString found in binary or memory: https://www.google.com/

      E-Banking Fraud:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000001.00000002.681613074.0000000004031000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.681348992.0000000003E9B000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Dintec Order PDF.exe PID: 3480, type: MEMORY

      System Summary:

      barindex
      Malicious sample detected (through community Yara rule)Show sources
      Source: 00000001.00000002.681613074.0000000004031000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000001.00000002.681613074.0000000004031000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: 00000001.00000002.681348992.0000000003E9B000.00000004.00000001.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: 00000001.00000002.681348992.0000000003E9B000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Source: Process Memory Space: Dintec Order PDF.exe PID: 3480, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
      Source: Process Memory Space: Dintec Order PDF.exe PID: 3480, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
      Initial sample is a PE file and has a suspicious nameShow sources
      Source: initial sampleStatic PE information: Filename: Dintec Order PDF.exe
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BF4880
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BF5008
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BFE1A0
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BFA4B8
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BF1C58
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BFC6E0
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BFAFB0
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BF7FC0
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BFA0F0
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BFE193
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BFA4AB
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BF1460
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BF1C49
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BFC6DB
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BF1E10
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BF1E01
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BFAF9F
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_04CC6630
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_04CC0040
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_04CCBDC8
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_04CC0830
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_04CC6603
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_04CC003B
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_04CC5C69
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_04CC5C78
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_04CCBDB9
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_04CCC8D8
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_04CCC8E8
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_04CC0820
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00C1A0F0
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00C14890
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00C1E1A0
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00C1A4B8
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00C11C58
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00C1C6E0
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00C17FC0
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00C1AFB0
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00C1E190
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00C1A4A8
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00C11C49
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00C11470
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00C1C6D3
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00C11E01
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00C11E10
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00C1AF9F
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_009E4882
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_009EA0F0
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_009EE190
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_009EA4A8
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_009E1C58
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_009E4EB8
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_009EC6D3
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_009EAF9F
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_009E7FC0
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_009E1C49
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_009E1460
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_009E1E10
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 3_2_009E1E01
      Source: Dintec Order PDF.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
      Source: a.exe.1.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
      Source: Dintec Order PDF.exe, 00000001.00000002.680841447.0000000003551000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameSHCore1.dll0 vs Dintec Order PDF.exe
      Source: Dintec Order PDF.exe, 00000001.00000002.684385297.0000000004CE0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenameKernelbase.dll.muij% vs Dintec Order PDF.exe
      Source: Dintec Order PDF.exe, 00000001.00000002.685771109.0000000008B20000.00000002.00000001.sdmpBinary or memory string: originalfilename vs Dintec Order PDF.exe
      Source: Dintec Order PDF.exe, 00000001.00000002.685771109.0000000008B20000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs Dintec Order PDF.exe
      Source: Dintec Order PDF.exe, 00000001.00000002.685507014.0000000008810000.00000002.00000001.sdmpBinary or memory string: System.OriginalFileName vs Dintec Order PDF.exe
      Source: Dintec Order PDF.exe, 00000001.00000002.684699800.0000000005610000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs Dintec Order PDF.exe
      Source: Dintec Order PDF.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
      Source: 00000001.00000002.681613074.0000000004031000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000001.00000002.681613074.0000000004031000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: 00000001.00000002.681348992.0000000003E9B000.00000004.00000001.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: 00000001.00000002.681348992.0000000003E9B000.00000004.00000001.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: Process Memory Space: Dintec Order PDF.exe PID: 3480, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, license = https://creativecommons.org/licenses/by-nc/4.0/, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
      Source: Process Memory Space: Dintec Order PDF.exe PID: 3480, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
      Source: classification engineClassification label: mal100.troj.evad.winEXE@4/6@0/0
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a.lnkJump to behavior
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to behavior
      Source: Dintec Order PDF.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\AppData\Roaming\a.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\AppData\Roaming\a.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\AppData\Roaming\a.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\AppData\Roaming\a.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\AppData\Roaming\a.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\AppData\Roaming\a.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: Dintec Order PDF.exeVirustotal: Detection: 42%
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeFile read: C:\Users\user\Desktop\Dintec Order PDF.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\Dintec Order PDF.exe 'C:\Users\user\Desktop\Dintec Order PDF.exe'
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\a.exe 'C:\Users\user\AppData\Roaming\a.exe'
      Source: unknownProcess created: C:\Users\user\AppData\Roaming\a.exe 'C:\Users\user\AppData\Roaming\a.exe'
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess created: C:\Users\user\AppData\Roaming\a.exe 'C:\Users\user\AppData\Roaming\a.exe'
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
      Source: Dintec Order PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: Dintec Order PDF.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
      Source: Binary string: InstallUtil.pdb\rvr hr_CorExeMainmscoree.dll source: InstallUtil.exe.1.dr
      Source: Binary string: InstallUtil.pdb source: InstallUtil.exe.1.dr
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BF89C3 push es; retf
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BFC5E3 pushad ; retf
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BFC513 pushad ; retf
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BFC510 pushad ; retf
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BFC569 pushad ; retf
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeCode function: 1_2_00BFB727 push edi; retf
      Source: C:\Users\user\AppData\Roaming\a.exeCode function: 2_2_00C1C569 pushad ; mov dword ptr [esp], 5504AE51h
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeFile created: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to dropped file
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeFile created: C:\Users\user\AppData\Roaming\a.exeJump to dropped file
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a.lnkJump to behavior
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a.lnkJump to behavior

      Hooking and other Techniques for Hiding and Protection:

      barindex
      Hides that the sample has been downloaded from the Internet (zone.identifier)Show sources
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeFile opened: C:\Users\user\Desktop\Dintec Order PDF.exe\:Zone.Identifier read attributes | delete
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\user\AppData\Roaming\a.exeProcess information set: NOOPENFILEERRORBOX

      Malware Analysis System Evasion:

      barindex
      Yara detected AntiVM_3Show sources
      Source: Yara matchFile source: Process Memory Space: Dintec Order PDF.exe PID: 3480, type: MEMORY
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeFile opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\a.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\AppData\Roaming\a.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\InstallUtil.exeJump to dropped file
      Source: C:\Users\user\Desktop\Dintec Order PDF.exe TID: 4240Thread sleep time: -2767011611056431s >= -30000s
      Source: C:\Users\user\Desktop\Dintec Order PDF.exe TID: 1584Thread sleep count: 157 > 30
      Source: C:\Users\user\Desktop\Dintec Order PDF.exe TID: 5776Thread sleep time: -30000s >= -30000s
      Source: C:\Users\user\Desktop\Dintec Order PDF.exe TID: 6076Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\AppData\Roaming\a.exe TID: 6868Thread sleep time: -30000s >= -30000s
      Source: C:\Users\user\AppData\Roaming\a.exe TID: 6832Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\user\AppData\Roaming\a.exe TID: 6912Thread sleep time: -30000s >= -30000s
      Source: C:\Users\user\AppData\Roaming\a.exe TID: 6844Thread sleep time: -922337203685477s >= -30000s
      Source: a.exe, 00000003.00000002.688769935.0000000004AF0000.00000004.00000001.sdmpBinary or memory string: VMware
      Source: a.exe, 00000003.00000002.688769935.0000000004AF0000.00000004.00000001.sdmpBinary or memory string: vmware svga
      Source: Dintec Order PDF.exe, 00000001.00000002.684385297.0000000004CE0000.00000002.00000001.sdmp, a.exe, 00000002.00000002.688652951.0000000004C90000.00000002.00000001.sdmp, a.exe, 00000003.00000002.688803329.0000000004B30000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
      Source: a.exe, 00000003.00000002.688769935.0000000004AF0000.00000004.00000001.sdmpBinary or memory string: vmware
      Source: Dintec Order PDF.exe, 00000001.00000002.680841447.0000000003551000.00000004.00000001.sdmp, a.exe, 00000002.00000002.686529597.00000000035C1000.00000004.00000001.sdmp, a.exe, 00000003.00000002.688769935.0000000004AF0000.00000004.00000001.sdmpBinary or memory string: tpautoconnsvc#Microsoft Hyper-V
      Source: Dintec Order PDF.exe, 00000001.00000002.680841447.0000000003551000.00000004.00000001.sdmp, a.exe, 00000002.00000002.686529597.00000000035C1000.00000004.00000001.sdmp, a.exe, 00000003.00000002.688769935.0000000004AF0000.00000004.00000001.sdmpBinary or memory string: cmd.txtQEMUqemu
      Source: Dintec Order PDF.exe, 00000001.00000002.680841447.0000000003551000.00000004.00000001.sdmp, a.exe, 00000002.00000002.686529597.00000000035C1000.00000004.00000001.sdmp, a.exe, 00000003.00000002.688769935.0000000004AF0000.00000004.00000001.sdmpBinary or memory string: vmusrvc
      Source: a.exe, 00000003.00000002.688769935.0000000004AF0000.00000004.00000001.sdmpBinary or memory string: vmsrvc
      Source: a.exe, 00000003.00000002.688769935.0000000004AF0000.00000004.00000001.sdmpBinary or memory string: vmtools
      Source: a.exe, 00000003.00000002.688769935.0000000004AF0000.00000004.00000001.sdmpBinary or memory string: vmware sata5vmware usb pointing device-vmware vmci bus deviceCvmware virtual s scsi disk device
      Source: a.exe, 00000003.00000002.688769935.0000000004AF0000.00000004.00000001.sdmpBinary or memory string: vboxservicevbox)Microsoft Virtual PC
      Source: Dintec Order PDF.exe, 00000001.00000002.684385297.0000000004CE0000.00000002.00000001.sdmp, a.exe, 00000002.00000002.688652951.0000000004C90000.00000002.00000001.sdmp, a.exe, 00000003.00000002.688803329.0000000004B30000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
      Source: Dintec Order PDF.exe, 00000001.00000002.684385297.0000000004CE0000.00000002.00000001.sdmp, a.exe, 00000002.00000002.688652951.0000000004C90000.00000002.00000001.sdmp, a.exe, 00000003.00000002.688803329.0000000004B30000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
      Source: a.exe, 00000003.00000002.688769935.0000000004AF0000.00000004.00000001.sdmpBinary or memory string: virtual-vmware pointing device
      Source: a.exe, 00000002.00000002.685914222.0000000000A0E000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: Dintec Order PDF.exe, 00000001.00000002.684385297.0000000004CE0000.00000002.00000001.sdmp, a.exe, 00000002.00000002.688652951.0000000004C90000.00000002.00000001.sdmp, a.exe, 00000003.00000002.688803329.0000000004B30000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess information queried: ProcessInformation
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess token adjusted: Debug
      Source: C:\Users\user\AppData\Roaming\a.exeProcess token adjusted: Debug
      Source: C:\Users\user\AppData\Roaming\a.exeProcess token adjusted: Debug
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeMemory allocated: page read and write | page guard
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeProcess created: C:\Users\user\AppData\Roaming\a.exe 'C:\Users\user\AppData\Roaming\a.exe'
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeQueries volume information: C:\Users\user\Desktop\Dintec Order PDF.exe VolumeInformation
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\a.exeQueries volume information: C:\Users\user\AppData\Roaming\a.exe VolumeInformation
      Source: C:\Users\user\AppData\Roaming\a.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\AppData\Roaming\a.exeQueries volume information: C:\Users\user\AppData\Roaming\a.exe VolumeInformation
      Source: C:\Users\user\AppData\Roaming\a.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
      Source: C:\Users\user\Desktop\Dintec Order PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

      Stealing of Sensitive Information:

      barindex
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000001.00000002.681613074.0000000004031000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.681348992.0000000003E9B000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Dintec Order PDF.exe PID: 3480, type: MEMORY

      Remote Access Functionality:

      barindex
      Detected Nanocore RatShow sources
      Source: Dintec Order PDF.exe, 00000001.00000002.681613074.0000000004031000.00000004.00000001.sdmpString found in binary or memory: NanoCore.ClientPluginHost
      Yara detected Nanocore RATShow sources
      Source: Yara matchFile source: 00000001.00000002.681613074.0000000004031000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000001.00000002.681348992.0000000003E9B000.00000004.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: Dintec Order PDF.exe PID: 3480, type: MEMORY

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationStartup Items1Startup Items1Masquerading1OS Credential DumpingQuery Registry1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobRegistry Run Keys / Startup Folder2Process Injection11Virtualization/Sandbox Evasion3LSASS MemorySecurity Software Discovery111Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothRemote Access Software1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Registry Run Keys / Startup Folder2Disable or Modify Tools1Security Account ManagerVirtualization/Sandbox Evasion3SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection11NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptHidden Files and Directories1LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information2Cached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery12Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      Dintec Order PDF.exe42%VirustotalBrowse
      Dintec Order PDF.exe100%Joe Sandbox ML

      Dropped Files

      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\a.exe100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%MetadefenderBrowse
      C:\Users\user\AppData\Local\Temp\InstallUtil.exe0%ReversingLabs
      C:\Users\user\AppData\Roaming\a.exe42%VirustotalBrowse

      Unpacked PE Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      SourceDetectionScannerLabelLink
      http://ns.adb0%Avira URL Cloudsafe
      http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
      http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
      http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
      http://pki.goog/gsr2/GTS1O1.crt00%URL Reputationsafe
      http://ns.adobe.c/g0%URL Reputationsafe
      http://ns.adobe.c/g0%URL Reputationsafe
      http://ns.adobe.c/g0%URL Reputationsafe
      http://ns.adobe.c/g0%URL Reputationsafe
      http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
      http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
      http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
      http://crl.pki.goog/gsr2/gsr2.crl0?0%URL Reputationsafe
      http://ocsp.pki.goog/gsr2020%URL Reputationsafe
      http://ocsp.pki.goog/gsr2020%URL Reputationsafe
      http://ocsp.pki.goog/gsr2020%URL Reputationsafe
      http://ocsp.pki.goog/gsr2020%URL Reputationsafe
      https://pki.goog/repository/00%URL Reputationsafe
      https://pki.goog/repository/00%URL Reputationsafe
      https://pki.goog/repository/00%URL Reputationsafe
      https://pki.goog/repository/00%URL Reputationsafe
      http://ns.adobe.cobj0%URL Reputationsafe
      http://ns.adobe.cobj0%URL Reputationsafe
      http://ns.adobe.cobj0%URL Reputationsafe
      http://ns.adobe.cobj0%URL Reputationsafe
      http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
      http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
      http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
      http://ocsp.pki.goog/gts1o1core00%URL Reputationsafe
      http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
      http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
      http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
      http://crl.pki.goog/GTS1O1core.crl00%URL Reputationsafe
      http://ns.ado/10%URL Reputationsafe
      http://ns.ado/10%URL Reputationsafe
      http://ns.ado/10%URL Reputationsafe
      http://ns.ado/10%URL Reputationsafe

      Domains and IPs

      Contacted Domains

      No contacted domains info

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://ns.adbDintec Order PDF.exe, 00000001.00000003.647767848.0000000008201000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://pki.goog/gsr2/GTS1O1.crt0Dintec Order PDF.exe, 00000001.00000002.680577443.00000000025AA000.00000004.00000001.sdmp, a.exe, 00000002.00000002.685914222.0000000000A0E000.00000004.00000020.sdmp, a.exe, 00000003.00000002.687185207.00000000025DA000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://ns.adobe.c/gDintec Order PDF.exe, 00000001.00000002.685200737.0000000008212000.00000004.00000001.sdmp, Dintec Order PDF.exe, 00000001.00000003.647767848.0000000008201000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://crl.pki.goog/gsr2/gsr2.crl0?Dintec Order PDF.exe, 00000001.00000002.680271086.0000000000951000.00000004.00000020.sdmp, a.exe, 00000002.00000002.685914222.0000000000A0E000.00000004.00000020.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://ocsp.pki.goog/gsr202Dintec Order PDF.exe, 00000001.00000002.680271086.0000000000951000.00000004.00000020.sdmp, a.exe, 00000002.00000002.685914222.0000000000A0E000.00000004.00000020.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      https://pki.goog/repository/0Dintec Order PDF.exe, 00000001.00000002.680271086.0000000000951000.00000004.00000020.sdmp, a.exe, 00000002.00000002.685914222.0000000000A0E000.00000004.00000020.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://ns.adobe.cobjDintec Order PDF.exe, 00000001.00000002.685200737.0000000008212000.00000004.00000001.sdmp, Dintec Order PDF.exe, 00000001.00000003.647767848.0000000008201000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://ocsp.pki.goog/gts1o1core0Dintec Order PDF.exe, 00000001.00000002.680577443.00000000025AA000.00000004.00000001.sdmp, a.exe, 00000002.00000002.685914222.0000000000A0E000.00000004.00000020.sdmp, a.exe, 00000003.00000002.687185207.00000000025DA000.00000004.00000001.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDintec Order PDF.exe, 00000001.00000002.680463344.0000000002541000.00000004.00000001.sdmp, a.exe, 00000002.00000002.686284355.00000000025BB000.00000004.00000001.sdmp, a.exe, 00000003.00000002.686878655.000000000257B000.00000004.00000001.sdmpfalse
        high
        http://schema.org/WebPagea.exe, 00000002.00000002.686386684.000000000261A000.00000004.00000001.sdmp, a.exe, 00000003.00000002.687185207.00000000025DA000.00000004.00000001.sdmpfalse
          high
          http://crl.pki.goog/GTS1O1core.crl0Dintec Order PDF.exe, 00000001.00000002.680577443.00000000025AA000.00000004.00000001.sdmp, a.exe, 00000002.00000002.685914222.0000000000A0E000.00000004.00000020.sdmp, a.exe, 00000003.00000002.687185207.00000000025DA000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown
          http://ns.ado/1Dintec Order PDF.exe, 00000001.00000002.685200737.0000000008212000.00000004.00000001.sdmp, Dintec Order PDF.exe, 00000001.00000003.647767848.0000000008201000.00000004.00000001.sdmpfalse
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          • URL Reputation: safe
          unknown

          Contacted IPs

          No contacted IP infos

          General Information

          Joe Sandbox Version:31.0.0 Emerald
          Analysis ID:345061
          Start date:27.01.2021
          Start time:16:43:19
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 8m 25s
          Hypervisor based Inspection enabled:false
          Report type:light
          Sample file name:Dintec Order PDF.exe
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:19
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@4/6@0/0
          EGA Information:Failed
          HDC Information:
          • Successful, ratio: 4.2% (good quality ratio 2.3%)
          • Quality average: 29.9%
          • Quality standard deviation: 33.7%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 0
          • Number of non-executed functions: 0
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Found application associated with file extension: .exe
          Warnings:
          Show All
          • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
          • Excluded IPs from analysis (whitelisted): 13.88.21.125, 52.147.198.201, 172.217.23.68, 172.217.23.36, 51.11.168.160, 92.123.180.163, 92.123.180.153, 52.155.217.156, 20.54.26.129, 67.26.81.254, 8.241.11.254, 8.241.11.126, 67.27.158.126, 8.248.141.254, 51.104.144.132
          • Excluded domains from analysis (whitelisted): displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, arc.msn.com.nsatc.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, ctldl.windowsupdate.com, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus16.cloudapp.net, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, audownload.windowsupdate.nsatc.net, www.google.com, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, auto.au.download.windowsupdate.com.c.footprint.net, skypedataprdcolwus15.cloudapp.net, au-bg-shim.trafficmanager.net
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.

          Simulations

          Behavior and APIs

          TimeTypeDescription
          16:44:12AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a.lnk
          16:44:21API Interceptor1x Sleep call for process: Dintec Order PDF.exe modified
          16:44:24API Interceptor2x Sleep call for process: a.exe modified

          Joe Sandbox View / Context

          IPs

          No context

          Domains

          No context

          ASN

          No context

          JA3 Fingerprints

          No context

          Dropped Files

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          C:\Users\user\AppData\Local\Temp\InstallUtil.exeIMG-47901.exeGet hashmaliciousBrowse
            SecuriteInfo.com.Trojan.Packed2.42783.27799.exeGet hashmaliciousBrowse
              SecuriteInfo.com.Trojan.Packed2.42783.24703.exeGet hashmaliciousBrowse
                Ewqm21Iwdh.exeGet hashmaliciousBrowse
                  a4iz7zkilq.exeGet hashmaliciousBrowse
                    Vcg9GH4CWw.exeGet hashmaliciousBrowse
                      nMn5eAMhBy.exeGet hashmaliciousBrowse
                        sSPHg0Y2cZ.exeGet hashmaliciousBrowse
                          vK6VPijMoq.exeGet hashmaliciousBrowse
                            8gom3VEZLS.exeGet hashmaliciousBrowse
                              y4Gpxq7eWg.exeGet hashmaliciousBrowse
                                DHL-#AWB130501923096PDF.exeGet hashmaliciousBrowse
                                  IMG_1677.EXEGet hashmaliciousBrowse
                                    PO#4018-308875.pdf.exeGet hashmaliciousBrowse
                                      file.exeGet hashmaliciousBrowse
                                        IMG_5371.EXEGet hashmaliciousBrowse
                                          file.exeGet hashmaliciousBrowse
                                            IMG_9501.EXEGet hashmaliciousBrowse
                                              IMG_04017.pdf.exeGet hashmaliciousBrowse
                                                GFS_03781.xls.exeGet hashmaliciousBrowse

                                                  Created / dropped Files

                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Dintec Order PDF.exe.log
                                                  Process:C:\Users\user\Desktop\Dintec Order PDF.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:modified
                                                  Size (bytes):1873
                                                  Entropy (8bit):5.355036985457214
                                                  Encrypted:false
                                                  SSDEEP:48:MxHKXeHKlEHU0YHKhQnouHIW7HKjovitHoxHhAHKzvr1qHj:iqXeqm00YqhQnouRqjoKtIxHeqzTwD
                                                  MD5:CDA95282F22F47DA2FDDC9E912B67FEF
                                                  SHA1:67A40582A092B5DF40C3EB61A361A2D336FC69E0
                                                  SHA-256:179E50F31095D0CFA13DCBB9CED6DEE424DFE8CEF8E05BDE1F840273F45E5F49
                                                  SHA-512:1D151D92AE982D2149C2255826C2FFB89A475A1EB9B9FE93DC3706F3016CD6B309743B36A4D7F6D68F48CE25391FDA7A2BAE42061535EEA7862460424A3A2036
                                                  Malicious:true
                                                  Reputation:moderate, very likely benign file
                                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                                                  C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\a.exe.log
                                                  Process:C:\Users\user\AppData\Roaming\a.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):1784
                                                  Entropy (8bit):5.35306750074546
                                                  Encrypted:false
                                                  SSDEEP:48:MxHKXeHKlEHU0YHKhQnouHIW7HKjovitHoxHhAHKzva:iqXeqm00YqhQnouRqjoKtIxHeqzC
                                                  MD5:4D3278A4C9BE931A3AFCEACB561B87DB
                                                  SHA1:E828DC80D92A261CA30E7333E7C2C3205C05AD7E
                                                  SHA-256:A45DF0DB57887914E4C1D5A8F8053E669561A9177B333BE50AE3CB1EA4770EEB
                                                  SHA-512:567CACB27FC7888FA3ABF924D64356780464DA20BDDB4A4719D15AD006522C0B1B75876A57E61CFC96A3A0C8C79F1D825F0D82C404AF0E53309A73CAF88519FF
                                                  Malicious:false
                                                  Reputation:moderate, very likely benign file
                                                  Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                                                  C:\Users\user\AppData\Local\Temp\InstallUtil.exe
                                                  Process:C:\Users\user\Desktop\Dintec Order PDF.exe
                                                  File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):41064
                                                  Entropy (8bit):6.164873449128079
                                                  Encrypted:false
                                                  SSDEEP:384:FtpFVLK0MsihB9VKS7xdgE7KJ9Yl6dnPU3SERztmbqCJstdMardz/JikPZ+sPZTd:ZBMs2SqdD86Iq8gZZFyViML3an
                                                  MD5:EFEC8C379D165E3F33B536739AEE26A3
                                                  SHA1:C875908ACBA5CAC1E0B40F06A83F0F156A2640FA
                                                  SHA-256:46DEE184523A584E56DF93389F81992911A1BA6B1F05AD7D803C6AB1450E18CB
                                                  SHA-512:497847EC115D9AF78899E6DC20EC32A60B16954F83CF5169A23DD3F1459CB632DAC95417BD898FD1895C9FE2262FCBF7838FCF6919FB3B851A0557FBE07CCFFA
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: Virustotal, Detection: 0%, Browse
                                                  • Antivirus: Metadefender, Detection: 0%, Browse
                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                  Joe Sandbox View:
                                                  • Filename: IMG-47901.exe, Detection: malicious, Browse
                                                  • Filename: SecuriteInfo.com.Trojan.Packed2.42783.27799.exe, Detection: malicious, Browse
                                                  • Filename: SecuriteInfo.com.Trojan.Packed2.42783.24703.exe, Detection: malicious, Browse
                                                  • Filename: Ewqm21Iwdh.exe, Detection: malicious, Browse
                                                  • Filename: a4iz7zkilq.exe, Detection: malicious, Browse
                                                  • Filename: Vcg9GH4CWw.exe, Detection: malicious, Browse
                                                  • Filename: nMn5eAMhBy.exe, Detection: malicious, Browse
                                                  • Filename: sSPHg0Y2cZ.exe, Detection: malicious, Browse
                                                  • Filename: vK6VPijMoq.exe, Detection: malicious, Browse
                                                  • Filename: 8gom3VEZLS.exe, Detection: malicious, Browse
                                                  • Filename: y4Gpxq7eWg.exe, Detection: malicious, Browse
                                                  • Filename: DHL-#AWB130501923096PDF.exe, Detection: malicious, Browse
                                                  • Filename: IMG_1677.EXE, Detection: malicious, Browse
                                                  • Filename: PO#4018-308875.pdf.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  • Filename: IMG_5371.EXE, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  • Filename: IMG_9501.EXE, Detection: malicious, Browse
                                                  • Filename: IMG_04017.pdf.exe, Detection: malicious, Browse
                                                  • Filename: GFS_03781.xls.exe, Detection: malicious, Browse
                                                  Reputation:moderate, very likely benign file
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z.Z..............0..T...........r... ........@.. ....................................`.................................4r..O....................b..h>...........p............................................... ............... ..H............text....R... ...T.................. ..`.rsrc................V..............@..@.reloc...............`..............@..B................hr......H........"..|J..........lm.......o......................................2~.....o....*.r...p(....*VrK..p(....s.........*..0..........(....(....o....o....(....o.... .....T(....o....(....o....o ...o!....4(....o....(....o....o ...o".....(....rm..ps#...o....($........(%....o&....ry..p......%.r...p.%.(.....(....('....((.......o)...('........*.*................"..(*...*..{Q...-...}Q.....(+...(....(,....(+...*"..(-...*..(....*..(.....r...p.(/...o0...s....}T...*....0.. .......~S...-.s
                                                  C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a.lnk
                                                  Process:C:\Users\user\Desktop\Dintec Order PDF.exe
                                                  File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                                                  Category:dropped
                                                  Size (bytes):854
                                                  Entropy (8bit):3.0159112944533297
                                                  Encrypted:false
                                                  SSDEEP:12:8wl0RsXowAOcQ/tz0/CSLm9RKMJkHgTCNfBT/v4t2Y+xIBjK:8iLDWLYr+Vpd7aB
                                                  MD5:CDE31B0A7CA104AEE6CB2FF9ABFED71F
                                                  SHA1:B92338857A61560D0E667E6E3EB5B9CCF22CE260
                                                  SHA-256:A835B03B57A7941B592CCF6825F308CDA3158A53B4B798B0E14C51D3E9DB1AB1
                                                  SHA-512:AF3C36C759A831D5366F2493A4AAF7BA2A97181D098C4E2D2394F06BC379A3D947A8D2BFCFDA2ADE9C3D6AC44B0895C0E4470AA8AECF1D960C7424E2E6FAE99D
                                                  Malicious:false
                                                  Reputation:low
                                                  Preview: L..................F.............................................................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....P.2...........a.exe.<............................................a...e.x.e.............\.....\.....\.....\.....\.a...e.x.e.$.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.R.o.a.m.i.n.g.\.a...e.x.e.............y.............>.e.L.:..er.=y...............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.................
                                                  C:\Users\user\AppData\Roaming\a.exe
                                                  Process:C:\Users\user\Desktop\Dintec Order PDF.exe
                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):643584
                                                  Entropy (8bit):5.320790042456682
                                                  Encrypted:false
                                                  SSDEEP:6144:0OplH55fOUxVcMpvWt56GyM0cwlnRvCSyiof5d+mxiqNdmwvg03:hHfNbxpvWtQMRwlnASyv71xiqZF
                                                  MD5:98E3C2AC1EFDD997B05A1FEE872630EC
                                                  SHA1:D3CE076AF7B45E1F11AAC5E3A1C984951C7B92BA
                                                  SHA-256:D09ED1437134F7E5C71EE4877E6D030C2750B6E1873FE6AFB0F82B988C591B44
                                                  SHA-512:F0C9CC82F29D547216672FC78C19CAAA23D432C63760433A17C86A4D484A49B879733659CEA68AE19FEEB1841A803C8BEE04CD96064C1CB3AE273E7299BE7EA7
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: Virustotal, Detection: 42%, Browse
                                                  Reputation:low
                                                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....3................P.................. ........@.. .......................@............`.....................................S.......B.................... ....................................................... ............... ..H............text...$.... ...................... ..`.rsrc...B...........................@..@.reloc....... ......................@..B........................H............&......>...La...[..........................................&..(.....*.s.........s.........s.........s ........*&........*".......*Vs....(3...t.........*..(4...*..(....*..(8...*..~....r...po5...tE...t....o8....*..(V...*..0..F............(@...u1...........(@...u................................... .K.M(B...t2... ..U.\(B...t......... 4.......... .... .....(B...t................(B...t....(....t2...(B...t2...(B...t............(B...t1...(@...u............(B...t....&..
                                                  C:\Users\user\AppData\Roaming\a.exe:Zone.Identifier
                                                  Process:C:\Users\user\Desktop\Dintec Order PDF.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):26
                                                  Entropy (8bit):3.95006375643621
                                                  Encrypted:false
                                                  SSDEEP:3:ggPYV:rPYV
                                                  MD5:187F488E27DB4AF347237FE461A079AD
                                                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                  Malicious:true
                                                  Reputation:high, very likely benign file
                                                  Preview: [ZoneTransfer]....ZoneId=0

                                                  Static File Info

                                                  General

                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):5.320790042456682
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  • DOS Executable Generic (2002/1) 0.01%
                                                  File name:Dintec Order PDF.exe
                                                  File size:643584
                                                  MD5:98e3c2ac1efdd997b05a1fee872630ec
                                                  SHA1:d3ce076af7b45e1f11aac5e3a1c984951c7b92ba
                                                  SHA256:d09ed1437134f7e5c71ee4877e6d030c2750b6e1873fe6afb0f82b988c591b44
                                                  SHA512:f0c9cc82f29d547216672fc78c19caaa23d432c63760433a17c86a4d484a49b879733659cea68ae19feeb1841a803c8bee04cd96064c1cb3ae273e7299be7ea7
                                                  SSDEEP:6144:0OplH55fOUxVcMpvWt56GyM0cwlnRvCSyiof5d+mxiqNdmwvg03:hHfNbxpvWtQMRwlnASyv71xiqZF
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....3................P.................. ........@.. .......................@............`................................

                                                  File Icon

                                                  Icon Hash:00828e8e8686b000

                                                  Static PE Info

                                                  General

                                                  Entrypoint:0x49e41e
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                  Time Stamp:0x9D433DF [Mon Mar 24 14:04:15 1975 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:v4.0.30319
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                  Entrypoint Preview

                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al

                                                  Data Directories

                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x9e3c80x53.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xa00000x642.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xa20000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                  Sections

                                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000x9c4240x9c600False0.5252344999data5.32775062207IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                  .rsrc0xa00000x6420x800False0.35595703125data3.69283936063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0xa20000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                  Resources

                                                  NameRVASizeTypeLanguageCountry
                                                  RT_VERSION0xa00a00x3b8COM executable for DOS
                                                  RT_MANIFEST0xa04580x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                                                  Imports

                                                  DLLImport
                                                  mscoree.dll_CorExeMain

                                                  Version Infos

                                                  DescriptionData
                                                  Translation0x0000 0x04b0
                                                  LegalCopyrightCopyright 1991 23F;HID;C92C>DJ
                                                  Assembly Version1.0.0.0
                                                  InternalNameDintec Order PDF.exe
                                                  FileVersion9.13.17.22
                                                  CompanyName23F;HID;C92C>DJ
                                                  Comments77E5FH5@:B:;3GBH4G7
                                                  ProductNameD6:CEB?E58538D9<25FG
                                                  ProductVersion9.13.17.22
                                                  FileDescriptionD6:CEB?E58538D9<25FG
                                                  OriginalFilenameDintec Order PDF.exe

                                                  Network Behavior

                                                  Network Port Distribution

                                                  UDP Packets

                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 27, 2021 16:44:00.369968891 CET4925753192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:00.420526028 CET53492578.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:02.034677029 CET6238953192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:02.096035004 CET53623898.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:03.912905931 CET4991053192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:03.960730076 CET53499108.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:05.790050030 CET5585453192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:05.846998930 CET53558548.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:09.958733082 CET6454953192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:10.006597042 CET53645498.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:11.314935923 CET6315353192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:11.371381998 CET53631538.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:17.520215988 CET5299153192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:17.569350958 CET53529918.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:18.648869038 CET5370053192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:18.699317932 CET53537008.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:19.893682003 CET5172653192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:19.941685915 CET53517268.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:22.173286915 CET5679453192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:22.221118927 CET53567948.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:23.031732082 CET5653453192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:23.087929964 CET53565348.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:23.151201010 CET5662753192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:23.176327944 CET5662153192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:23.216319084 CET53566278.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:23.227221012 CET53566218.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:24.032463074 CET6311653192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:24.080446959 CET53631168.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:25.059024096 CET6407853192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:25.085433960 CET6480153192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:25.109750986 CET53640788.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:25.136379957 CET53648018.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:26.191709995 CET6172153192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:26.242696047 CET53617218.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:27.431175947 CET5125553192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:27.481992960 CET53512558.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:28.297048092 CET6152253192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:28.350481033 CET53615228.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:29.657900095 CET5233753192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:29.718781948 CET53523378.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:42.962939024 CET5504653192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:43.022135019 CET53550468.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:43.544616938 CET4961253192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:43.607117891 CET53496128.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:44.167186022 CET4928553192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:44.223592997 CET53492858.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:44.378401995 CET5060153192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:44.450712919 CET53506018.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:44.659657001 CET6087553192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:44.711767912 CET53608758.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:45.163724899 CET5644853192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:45.213849068 CET53564488.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:45.748568058 CET5917253192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:45.810645103 CET53591728.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:46.401335001 CET6242053192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:46.458602905 CET53624208.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:47.273775101 CET6057953192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:47.330384016 CET53605798.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:48.324867964 CET5018353192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:48.381885052 CET53501838.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:48.881405115 CET6153153192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:48.942864895 CET53615318.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:44:49.295454979 CET4922853192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:44:49.355367899 CET53492288.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:45:00.754601955 CET5979453192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:45:00.802643061 CET53597948.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:45:00.874398947 CET5591653192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:45:00.945894957 CET53559168.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:45:02.516755104 CET5275253192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:45:02.580696106 CET53527528.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:45:35.890669107 CET6054253192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:45:35.943331003 CET53605428.8.8.8192.168.2.4
                                                  Jan 27, 2021 16:45:37.506793976 CET6068953192.168.2.48.8.8.8
                                                  Jan 27, 2021 16:45:37.563329935 CET53606898.8.8.8192.168.2.4

                                                  Code Manipulations

                                                  Statistics

                                                  Behavior

                                                  Click to jump to process

                                                  System Behavior

                                                  General

                                                  Start time:16:44:04
                                                  Start date:27/01/2021
                                                  Path:C:\Users\user\Desktop\Dintec Order PDF.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Users\user\Desktop\Dintec Order PDF.exe'
                                                  Imagebase:0x1b0000
                                                  File size:643584 bytes
                                                  MD5 hash:98E3C2AC1EFDD997B05A1FEE872630EC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Yara matches:
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.681613074.0000000004031000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.681613074.0000000004031000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.681613074.0000000004031000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000001.00000002.681348992.0000000003E9B000.00000004.00000001.sdmp, Author: Florian Roth
                                                  • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000001.00000002.681348992.0000000003E9B000.00000004.00000001.sdmp, Author: Joe Security
                                                  • Rule: NanoCore, Description: unknown, Source: 00000001.00000002.681348992.0000000003E9B000.00000004.00000001.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                                                  Reputation:low

                                                  General

                                                  Start time:16:44:21
                                                  Start date:27/01/2021
                                                  Path:C:\Users\user\AppData\Roaming\a.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Users\user\AppData\Roaming\a.exe'
                                                  Imagebase:0x250000
                                                  File size:643584 bytes
                                                  MD5 hash:98E3C2AC1EFDD997B05A1FEE872630EC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Antivirus matches:
                                                  • Detection: 100%, Joe Sandbox ML
                                                  • Detection: 42%, Virustotal, Browse
                                                  Reputation:low

                                                  General

                                                  Start time:16:44:21
                                                  Start date:27/01/2021
                                                  Path:C:\Users\user\AppData\Roaming\a.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:'C:\Users\user\AppData\Roaming\a.exe'
                                                  Imagebase:0x110000
                                                  File size:643584 bytes
                                                  MD5 hash:98E3C2AC1EFDD997B05A1FEE872630EC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:.Net C# or VB.NET
                                                  Reputation:low

                                                  Disassembly

                                                  Code Analysis

                                                  Reset < >